IEEE Master Brand

Second IEEE International
Information Assurance Workshop

April 8th-9th, 2004  –  Charlotte, NC, USA

Computer Society Logo

IEEE IA Activities Home

IWIA Home

Registration Form

Program

Call for Papers

Call for Participation

Location and Accommodation Information

Author Instructions

IASC Standardization Activities

University of North Carolina at Charlotte - Self Made Man

The IEEE Task Force on Information Assurance is sponsoring the second annual workshop on information assurance in cooperation with the ACM SIGSAC on research and experience in information assurance.

This workshop is part of a comprehensive IEEE program to realize the potential of IT to deliver the information it produces and stores. An open forum is provided for contributions covering research, applications, policy-related issues, and standards on information assurance and security and underlying technologies.

It is the goal of this workshop to bring together researchers and practicioners from both governmental, defense, intelligence, and civilian areas and to stimulate discussions on current and future problems as well as solutions.

The workshop will be held in a two-day format and retain the highly interactive character of the first workshop.

Overall participation is limited, early registration of observers is therefore recommended.

Program Committee

Mario Barbacci Carnegie Mellon SEI, USA
Tim Gibson DARPA, USA
Jim Hughes StorageTek, USA
John James United States Military Academy, USA
Emil Lupu Imperial College London, UK
John McDermott U.S. Naval Research Laboratory, USA
James Bret Michael Naval Postgraduate School, USA
Henry L. Owen Georgia Institute of Technology, USA
Peter Ryan U. of Newcastle upon Tyne, UK

General Chairs

Yuliang Zheng U. of North Carolina Charlotte, USA
Jack Cole US Army Research Laboratory, USA

Program Chair

Stephen D. Wolthusen Fraunhofer-IGD, Germany

This page and all contents (unless otherwise noted) are
Copyright © 2003 - 2004 Institute of Electrical and Electronics Engineers, Inc..
All rights reserved.

in cooperation with the 
ACM Special Interest Group on
 Security, Audit, and Control