|
Conference
Chairs
General Chairs
A.
Abraham
School of
Computer Science and Engineering,
Chung-Ang University,
221
Heukseok-dong, Dongjak-gu
Seoul 156-756, Korea
Email:
ajith.abraham@ieee.org
M. Sambandham
Department of Mathematics,
Morehouse College
Atlanta, GA 30314, USA
Program Chairs
J. Thomas
Department of
Computer Science
Oklahoma State University (Tulsa)
700 N Greenwood
Avenue
Oklahoma 74106, USA
Email:
jpt@okstate.edu
C. Peng
Department of Mathematics,
Morehouse College
Atlanta, GA 30314, USA
International Technical Committee
Sugata
Sanyal, Tata Institute of Fundamental Research, India
Robert Akl, University of North Texas, USA
Edwin H-M. Sha, University of Texas at Dallas, USA
Katrin Franke, Fraunhofer Institute, Germany
Frank Adelstein, ATC-NY,
Ithaca, USA
Steve Tate, University of North Texas, USA
Vijay Varadharajan, Macquerie University, Australia
Dharma P. Agrawal, University of Cincinnati, USA
Rayford B. Vaughn, Mississippi State University, USA
N. Zhang, University of Manchester, UK
Madjid Merabti, Liverpool John Moores University, UK
Marcin Paprzycki , Oklahoma State University, USA
Maria Ganzha, Private Higher
Educational Institute, Poland
Luc Longpre, University of Texas, El Paso, USA
George Ghinea, Brunel University, UK
Mathews Thomas, IBM e-commerce solutions center, USA
Massimiliano Rak, Second
University of Naples, Italy
Ashutosh
Saxena, IDRBT, India
Nedeljko Cvejic, University of
Bristol, UK
S Venkatesan, University of
Texas, Dallas, USA
|
Description:
Information
assurance has become an important research issue. Finding
effective ways to protect information systems, networks and
sensitive data within the critical information
infrastructure is challenging even with the most advanced
technology and trained professionals. This track aims to
bring together individuals involved in multiple disciplines
of information security and assurance to foster exchange of
ideas. This special track invites authors to submit original
contributions of not more than 8 pages which include, but
are not limited to the following topics of interest: |
- Authentication
- Data protection
- Computer
forensics
- Internet and www
security
- Information and
data integrity
- Intrusion
detection
- Data and system
integrity
- Authorization
and access control
- Information
warfare and cyber-terrorism
- Security models
and architectures
- Risk analysis
and risk management
- Security
verification
- Cryptography and
coding
- Cryptographic
protocols
- E-commerce
protocols
- Agent and mobile
code security
- Security in
sensor networks
- Biometrics
- Key management
- Homeland
security
- Wireless and ad
hoc network security
- Information
security management
- Database and
system security
- Denial of
service
|
Paper
Submission:
Papers
should be original and contain contributions of theoretical or
experimental nature, or be unique experience reports. Interested
authors should submit a 6-page summary of their original and unpublished
work including 5 keywords in the IEEE format to the track chair.
Electronic submission in the PDF or Word format is strongly encouraged.
Evaluation
Process:
Papers will be evaluated for originality, significance, clarity,
and soundness. Except for invited papers, all papers
will be reviewed by at least three independent reviewers. Accepted
papers will be published by IEEE CS Press. Selected papers presented in the conference will be
considered for publication in a special issue of an international
journal.
Best
Student Paper:
The
Best Student Paper will be awarded at the conference. To be eligible,
the student must be the sole author of the paper, or the first
author and primary contributor. (The winner of the award will
present the paper in a plenary session at the conference). A cover
letter to the General Chair/Program Chair must identify the paper
as a candidate for this competition at the time of submission.
Deadlines:
Submission deadline: May
15, 2006
Author Notification: June 15, 2006
Camera Ready (6 pages):
July 15, 2006
|
|
|