IEEE Master Brand

Call for Papers

Second IEEE International
Information Assurance Workshop

April 8-9th, 2004  –  Charlotte, NC, USA

Computer Society Logo

Important Dates


Information Assurance (IA) guarantees information delivery under well-defined constraints and guards against failures caused by the manner in which information technology (IT) is developed, by malicious human acts, and by natural disaster.

This workshop is part of a comprehensive IEEE program to realize the potential of IT to deliver the information it produces and stores. An open forum is provided for contributions covering research, applications, policy-related issues, and standards on information assurance and security and underlying technologies.


The IEEE Task Force on Information Assurance is sponsoring a workshop on information assurance in cooperation with the ACM SIGSAC on research and experience in information assurance. The workshop seeks submissions from academia, government, and industry presenting novel research, applications and experience, and policy on all theoretical and practical aspects of IA. Possible topics include, but are not limited to the following:

Accepted papers will be published by IEEE Press in a proceedings volume.

Program Committee

Mario Barbacci Carnegie Mellon SEI, USA
Tim Gibson DARPA, USA
Jim Hughes StorageTek, USA
John James United States Military Academy, USA
Emil Lupu Imperial College London, UK
John McDermott U.S. Naval Research Laboratory, USA
James Bret Michael Naval Postgraduate School, USA
Henry L. Owen Georgia Institute of Technology, USA
Peter Ryan U. of Newcastle upon Tyne, UK

General Chairs

Yuliang Zheng U. of North Carolina Charlotte, USA
Jack Cole US Army Research Laboratory, USA

Program Chair

Stephen D. Wolthusen Fraunhofer-IGD, Germany

Work-In-Progress Submissions

Work-in-progress (WIP) reports are intended to provide timely dissemination of ideas and preliminary research results. WIP will not be included in the proceedings volume, but will be made available to workshop attendees and optionally through the IWIA WWW site. WIP submissions should have at most 5 pages excluding the bibliography and appendices (using 10pt body text and two-column layout) and should otherwise meet the formal criteria listed below for full papers.

Full Paper Submissions

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with proceedings. The paper must list all authors and their affiliates on a separate sheet; in case of multiple authors, the contact author must be indicated. The paper itself must be blinded. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader.

Submissions should have at most 15 pages excluding the bibliography and appendices (using 10pt body text and two-column layout), and at most 20 pages total.

Submissions not meeting these guidelines risk rejection without consideration of their merits.

Authors must submit a separate assurance argument for their results. The argument must be no longer than 1024 words of text. Use of tables and diagrams is encouraged. Arguments will not count as part of the paper but will be used by the program committee to evaluate the submission. Work submitted without an assurance argument will not be accepted.

The assurance argument must explain the threats addressed by the work. It must address the relationship between the author's work and the four assurance disciplines of technical, operational, physical, and personnel security. These relationships should be described in terms of claims that are enforced and assumptions that are necessary. The assurance argument must address the impact of tampering or bypass attempts against the proposed results. Major trust relationships should be identified as part of the argument.

Papers on development, assurance, or evaluation methodologies should submit a similar argument explaining the relationship of the proposed work to the Common Criteria.

Submissions and questions should be sent electronically to IWIA2004@IGD.FHG.DE

This Call for Papers is also available in:
Adobe Portable Document Format   Get Acrobat Reader
Adobe PostScript

This page and all contents (unless otherwise noted) are
Copyright © 2003 Institute of Electrical and Electronics Engineers, Inc..
All rights reserved.

In cooperation with the ACM Special Interest Group on
       Security, Audit, and Control