The Italian chapter of the EATCS organisation
has decided to patronate TGC 2014 and to offer a free 1-year membership to the Italian participants of TGC who have never been members of EATCS.
Deadline for abstract submission: | May 9 2014 | |
Deadline for paper submission: | May 16 2014 | |
Notification to authors: | June 27 2014 |
Time | Title |
---|---|
9:00-10:00 | Invited talk: Catuscia Palamidessi
CNRS, France
Generalized bisimulation metrics (joint with CONCUR) Abstract The bisimilarity pseudometric based on the Kantorovich lifting is one of the most popular metrics for probabilistic processes proposed in the literature. However, its application in verification is limited to linear properties. We propose a generalization of this metric which allows to deal with a wider class of properties, such as those used in security and privacy. More precisely, we propose a family of metrics, parametrized on a notion of distance which depends on the property we want to verify. Furthermore, we show that the members of this family still characterize bisimilarity in terms of their kernel, and provide a bound on the corresponding metrics on traces. Finally, we study the case of a metric corresponding to differential privacy. We show that in this case it is possible to have a dual form, easier to compute, and we prove that the typical constructs of process algebra are non-expansive with respect to this metrics, thus paving the way to a modular approach to verification. |
10:00-10:30 | Coffee Break |
10:30-12:30 | Session 1: Theory
Chair: Michele Loreti
|
12:30-14:00 | Lunch |
14:00-15:30 | Session 2: Session Types (I)
Chair: Massimo Bartoletti
|
15:30-16:00 | Coffee break |
16:00-18:00 | Session 3: Short talks
Chair: Emilio Tuosto
|
Time | Title |
---|---|
09:00-10:00 | Invited talk:
Véronique Cortier
Electronic voting: how to ensure privacy and verifiability Abstract Electronic voting should offer at least the same guarantees than traditional paper-based voting systems. In order to achieve this, electronic voting protocols make use of cryptographic primitives, as in the more traditional case of authentication or key exchange protocols. All these protocols are notoriously difficult to design and flaws may be found years after their first release. Formal models as well as computational models have been successfully applied to automatically analyze traditional protocols and discover flaws. Electronic voting protocols however significantly increase the difficulty of the analysis task. Indeed, they involve for example new and sophisticated cryptographic primitives, new dedicated security properties, and new execution structures. Surprisingly, even an (apparently) simple property such as ballot privacy is difficult to define. After an introduction to electronic voting, we will study how to define ballot privacy and verifiability and we will describe some current techniques for e-voting protocols analysis. |
10:00-10:30 | Coffee Break |
10:30-12:30 | Session 4: Security
Chair: Peter Thiemann
|
12:30-14:00 | Lunch |
14:00-15:30 | Session 5: Session Types (II)
Chair: Stephanie Delaune
|
15:30-16:00 | Coffee break |
16:00-17:30 | Session 6: Cryptographic Protocol Analysis
Chair: Matteo Maffei
|
17:30-17:45 | Closing |
CLICK HERE TO REGISTER ONLINE Registrations will be done online through www.easyconferences.org. Participants may pay instantly using their credit card (VISA/MASTERCARD), or by bank transfer. A one-stop-shop software is used for the whole registration process, www.easyconferences.org. The whole process is very easy to use, it is totally secure and can be completed in a few minutes. Please note that participants may not only register for the conference through www.easyconferences.org, but they can also book their accommodation, social events etc. All additional services are offered at specially conference negotiated rates. Furthermore, the software provides participants with the possibility to complete the registration process periodically; participants may register for the conference and return later to book further services (subject to availability).
Registration Steps
TGC 2014 Registration Fees
|
Early
Fees |
Late Fees (28 Jul - 31 Aug 2014) |
Onsite
Fees |
TGC Full Registration (5-6 Sept) |
€ 170.00 |
€ 240.00 |
€ 330.00 |
TGC Student Registration (5-6 Sept) |
€ 140.00 |
€ 190.00 |
€ 290.00 |
CONCUR+TGC Full Registration (2-6 Sept) |
€ 530,00 |
€ 600.00 |
€ 690.00 |
CONCUR+TGC Student Registration (2-6 Sept) |
€ 400.00 |
€ 450.00 |
€ 550.00 |
CONCUR+TGC+TCS Full Registration (1-6 Sept) |
€ 660,00 |
€ 730.00 |
€820.00 |
CONCUR+TGC+TCS Student Registration (1-6 Sept) |
€ 490.00 |
€ 540.00 |
€ 640.00 |
Note:
|
Papers have to be submitted through EasyChair.
Contributions must be in PostScript or PDF format and consist of no more than 15 pages in the Springer's LNCS style. Clearly marked appendixes may include additional details and proofs omitted due to space limitations.
Submitted papers must describe work unpublished in refereed venues, and not submitted for publication elsewhere, with the exception of CONCUR. Concurrent submissions to CONCUR 2014 and TGC 2014 are allowed, and in fact encouraged, for those papers that may potentially enhance both conferences. Authors of such double submissions should flag them to the program chairs at the time of submission (by choosing the ’Regular Paper submitted to CONCUR’ paper category). Reviews may be shared between CONCUR and TGC. CONCUR's timeline is ahead of TGC's; submissions accepted by CONCUR will be considered automatically withdrawn from TGC.
We plan to publish post-proceedings shortly after the conference, to give the authors the opportunity to take into account discussions and suggestions at the conference.
The post-proceedings will appear as a volume in Springer’s Lecture Notes in Computer Science (LNCS) series.
Pre-proceedings with the accepted papers will be made available at the conference.