Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    WIDA'09 2009 - WIDA'09 2nd IEEE International Workshop on Information and Data Assurance

    View: 1573

    Website http://www.ipccc.org/ | Want to Edit it Edit Freely

    Category WIDA'09 2009

    Deadline: October 15, 2009 | Date: December 14, 2009

    Venue/Country: Arizona, U.S.A

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    WIDA'09

    The 2nd IEEE International Workshop on Information and Data Assurance

    In conjunction with IEEE IPCCC 2009

    Increasing reliance on the Internet for business and commercial purposes and the global availability of information has resulted in a whole suit of problems that are rooted in information assurance. As more and more complex systems evolve, the need for security and data assurance grows even more. Large corporations and research institutions regularly come up with solutions to counter malicious and non-malicious, external and internal threats. However, the field of information assurance is such that new threats evolve on a regular basis and continuous research and innovation is critical to stem the threats that continually arise. Information Assurance can then be defined as the protection and defense of information systems so as to ensure the authenticity, availability, confidentiality, integrity, and non-repudiation of critical data and user credentials. Authentication is a direct approach to information assurance, where the external party is asked to prove its authenticity. This can be achieved by encryption, certification or some previously agreed upon protocol. Confidentiality and integrity cover the areas of data protection by directly modifying the data using encryption or keeping the data in secured backed-up locations. The goal of non-repudiation states that an entity that has proven its identity should also be held responsible for its actions. We seek papers that address theoretical, empirical, experimental and system-related approaches to information assurance. Papers should describe original and previously unpublished work. Additionally, the papers should not be currently under review at other conference, workshop or journals. Accepted papers will be published in the proceedings of IPCCC. Topics of interest include, but are not limited to:

    Wireless and Ad-hoc Security

    Network and Data Restoration

    Network Reliability/Availability

    Denial of Service Protection

    Security system architecture

    Optical networks security

    Intrusion Detection and Prevention

    Sensor network security

    Trust negotiation/management

    Privacy models and mechanisms

    E-commerce security

    Man-in-the-middle and other attack analysis

    Key management and Cryptography

    Botnets detection and response

    Authorization, account management and access-control

    Web/Internet security

    Theoretical and empirical risk analysis

    Final Paper Submission Guidelines

    Papers should describe original, previously unpublished work, not currently under review by another conference, workshop, or journal. Authors are invited to submit a maximum of 8 page regular papers and 4 page short papers including the abstract, figures and references. Papers should include the title, author(s), authors' affiliation and an abstract. The formatting should be according to IEEE conference style available at: www.computer.org/portal/site/cscps.

    Please note that the paper will not be included in conference proceedings if its length exceeds 8 pages. Papers should be submitted in a PDF format using the EDAS system at: https://edas.info/newPaper.php?c=8175

    Program Chairs:

    Anurag Gupta (Google Inc) anurag.guptaatieee.org

    Anindo Mukherjee (Google Inc) anindomatgmail.com

    Technical Program Committee Members:

    Avinash Srinivasan, Bloomsburg University

    Dharma Agrawal, University of Cincinnati

    Falko Dressler, University of Erlangen

    Farid Naït-Abdesselam, University of Lille

    Haitang Wang, Motorola Inc.

    Hongmei Deng, Intelligent Automation Inc.

    Marco Cremonini, Universita` di Milano

    Mukesh Singhal, University of Kentucky

    Sokratis Katsikas, University of Piraeus

    Stephan Eidenbenz, Los Alamos National Laboratory

    Tarun Joshi, Microsoft Inc.

    Vasilis Friderikos, King's College London

    Ye Xia, University of Florida

    Yingying Chen, Stevens Institute of Technology

    Zhen Jiang, West Chester University of Pennsylvania


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.