IEEE Master Brand

Call for Papers

Third IEEE International
Information Assurance Workshop

March 23 - 24, 2005  –  University of Maryland, USA

Computer Society Logo

Important Dates

Background

Information Assurance (IA) guarantees information delivery under well-defined constraints and guards against failures caused by the manner in which information technology (IT) is developed, by malicious human acts, and by natural disaster.

This workshop is part of a comprehensive IEEE program to realize the potential of IT to deliver the information it produces and stores with high assurance. An open forum is provided for contributions covering research, applications, policy-related issues, and standards on information assurance and security and underlying technologies.

Overview

The IEEE Task Force on Information Assurance is sponsoring a workshop on information assurance in cooperation with the ACM SIGSAC on research and experience in information assurance. The workshop seeks submissions from academia, government, and industry presenting novel research, applications and experience, and policy on all theoretical and practical aspects of IA. Possible topics include, but are not limited to the following:

Accepted papers will be published by IEEE Press in a proceedings volume.

Program Committee

Blaine Burnham U. of Nebraska Omaha, USA
Yves Deswarte LAAS - CNRS, France
Tim Gibson DARPA, USA
Dieter Gollmann U. of Hamburg-Harburg, Germany
Sushil Jajodia George Mason University, USA
John James United States Military Academy, USA
Paul Karger IBM T.J. Watson Labs, USA
Carl Landwehr National Science Foundation, USA
Emil Lupu Imperial College London, UK
John McDermott U.S. Naval Research Laboratory, USA
Henry L. Owen Georgia Institute of Technology, USA
Peter G. Neumann SRI CSL, USA
Gene Spafford Purdue University, USA
Shambhu Upadhyaya SUNY Buffalo, USA
John Zachary U. of South Carolina, USA
Yuliang Zheng U. of North Carolina Charlotte, USA

General Chair

Jack Cole US Army Research Laboratory, USA

Program Chair

Stephen D. Wolthusen Fraunhofer-IGD, Germany

Work-In-Progress Submissions

Work-in-progress (WIP) reports are intended to provide timely dissemination of ideas and preliminary research results. WIP will not be included in the proceedings volume, but will be made available to workshop attendees and optionally through the IWIA WWW site. WIP submissions should have at most 5 pages excluding the bibliography and appendices (using 10pt body text and two-column layout) and should otherwise meet the formal criteria listed below for full papers.

Full Paper Submissions

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with proceedings. The paper must list all authors and their affiliates on a separate sheet; in case of multiple authors, the contact author must be indicated. The paper itself must be blinded. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader.

Submissions should have at most 15 pages excluding the bibliography and appendices (using 10pt body text and two-column layout), and at most 20 pages total.

Submissions not meeting these guidelines risk rejection without consideration of their merits.

Authors must submit a separate assurance argument for their results. The argument must be no longer than 1024 words of text. Use of tables and diagrams is encouraged. Arguments will not count as part of the paper but will be used by the program committee to evaluate the submission. Work submitted without an assurance argument will not be accepted.

The assurance argument must explain the threats addressed by the work. It must address the relationship between the author's work and the four assurance disciplines of technical, operational, physical, and personnel security. These relationships should be described in terms of claims that are enforced and assumptions that are necessary. The assurance argument must address the impact of tampering or bypass attempts against the proposed results. Major trust relationships should be identified as part of the argument.

Papers on development, assurance, or evaluation methodologies should submit a similar argument explaining the relationship of the proposed work to the Common Criteria.

There will be a best student paper award pending sufficient submissions. Please state clearly whether full-time students made major contributions to a paper at the time of submission. These papers will, however, be refereed identially with all other submissions.

Submissions and questions should be sent electronically to IWIA2005@IGD.FHG.DE

This Call for Papers is also available in:
Adobe Portable Document Format   Get Acrobat Reader
Adobe PostScript


This page and all contents (unless otherwise noted) are
Copyright © 2004 Institute of Electrical and Electronics Engineers, Inc..
All rights reserved.

In cooperation with the ACM Special Interest Group on
       Security, Audit, and Control