Call for Papers
Fourth IEEE International
Sponsored by the
IEEE Computer Society Task Force on Information Assurance and the
IEEE Technical Committee on Software Engineering
in cooperation with the
ACM Special Interest Group on Security, Audit, and Control
Information Assurance (IA) guarantees information delivery under well-defined constraints and guards against failures caused by the manner in which information technology (IT) is developed, by malicious human acts, and by natural disaster.
This workshop is part of a comprehensive IEEE program to realize the potential of IT to deliver the information it produces and stores with high assurance. An open forum is provided for contributions covering research, applications, policy-related issues, and standards on information assurance and security and underlying technologies.
The IEEE Task Force on Information Assurance together with the IEEE Technical Committee on Software Engineering issponsoring a workshop on information assurance in cooperation with the ACM SIGSAC on research and experience in information assurance. The workshop seeks submissions from academia, government, and industry presenting novel research, applications and experience, and policy on all theoretical and practical aspects of IA. Possible topics include, but are not limited to the following:
Accepted papers will be published by IEEE Press in a proceedings volume.
|Paul Croll||CSC, USA|
|Mohamed Eltoweissy||Virginia Tech, USA|
|Tim Gibson||DARPA, USA|
|Dieter Gollmann||U. of Hamburg-Harburg, Germany|
|Sushil Jajodia||George Mason University, USA|
|John James||United States Military Academy, USA|
|Paul Karger||IBM T.J. Watson Labs, USA|
|Carl Landwehr||National Science Foundation, USA|
|Emil Lupu||Imperial College London, UK|
|John McDermott||U.S. Naval Research Laboratory, USA|
|Peter G. Neumann||SRI CSL, USA|
|Kenny Paterson||Royal Holloway, UK|
|Samuel Redwine||James Madison University, USA|
|Peter Ryan||University of Newcastle-upon-Tyne, UK|
|Gene Spafford||Purdue University, USA|
|Yuliang Zheng||U. of North Carolina Charlotte, USA|
|Jack Cole||US Army Research Laboratory, USA|
|Stephen D. Wolthusen||Fraunhofer-IGD, Germany|
Work-in-progress (WIP) reports are intended to provide timely dissemination of ideas and preliminary research results. WIP will not be included in the proceedings volume, but will be made available to workshop attendees and optionally through the IWIA WWW site. WIP submissions should have at most 5 pages excluding the bibliography and appendices (using 10pt body text and two-column layout) and should otherwise meet the formal criteria listed below for full papers.
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with proceedings. The paper must list all authors and their affiliates on a separate sheet; in case of multiple authors, the contact author must be indicated. The paper itself must be blinded. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader.
Submissions should have at most 15 pages excluding the bibliography and appendices (using 10pt body text and two-column layout), and at most 20 pages total.
Submissions not meeting these guidelines risk rejection without consideration of their merits.
Authors must submit a separate assurance argument for their results. The argument must be no longer than 1024 words of text. Use of tables and diagrams is encouraged. Arguments will not count as part of the paper but will be used by the program committee to evaluate the submission. Work submitted without an assurance argument will not be accepted.
The assurance argument must explain the threats addressed by the work. It must address the relationship between the author's work and the four assurance disciplines of technical, operational, physical, and personnel security. These relationships should be described in terms of claims that are enforced and assumptions that are necessary. The assurance argument must address the impact of tampering or bypass attempts against the proposed results. Major trust relationships should be identified as part of the argument.
Papers on development, assurance, or evaluation methodologies should submit a similar argument explaining the relationship of the proposed work to the Common Criteria.
There will be a best student paper award pending sufficient submissions. Please state clearly whether full-time students made major contributions to a paper at the time of submission. These papers will, however, be refereed identially with all other submissions.
Submissions and questions should be sent electronically to SWOLTHUSEN@IEEE.ORG
This page and all contents (unless otherwise noted) are
|In cooperation with the|