6th IEEE Information Assurance Workshop
                         "The West Point Workshop"
                              15-17 June 2005
                      United States Military Academy
                           West Point, New York
		   http://www.itoc.usma.edu/workshop/2005/

                              Call For Papers

             The 6th IEEE SMC Information Assurance Workshop,
                   West Point, New York, 15-17 June 2005


The workshop is designed to provide a forum for Information Assurance
researchers and practitioners to share their research and experiences.
Attendees hail from industry, government, and academia. The focus of this
workshop is on innovative, new technologies designed to address important
Information Assurance issues.

Please see the author's information link for specific guidance and
manuscript preparation.

Papers will be divided into two broad programs. Approximately 3/4 of the
papers will focus on innovative new technical research in Information
Assurance. The remaining 1/4 of the papers will address recent experience,
lessons learned, and best practices from information assurance educators
and practitioners.

Last year the IEEE IAW added a new track on Honeynet Technologies. The
Honeynet Project (www.honeynet.org) sponsored this track that focused on
implementation of Honeynet systems and analysis of data derived from
Honeynet systems.  This will remain a specific focus of the IAW this year.

New this year to the technical track is at least one session on Security
Data Visualization techniques and at least one session on Biometrics.

Please see the "Author Information Link" for detailed information on
submission requirements.
Questions can be sent to:
Dr Ronald Dodge, Chair, ronald.dodge@usma.edu or
Dr. John James, Publications Chair, john.james@usma.edu

Other areas of particular interest at this workshop include, but are not
limited to:


|-----------+-------------------------------------------------------------|
| Technical | o         Innovative intrusion detection and response       |
|           | methodologies                                               |
|           |                                                             |
|           |                                                             |
|           | o         Information warfare                               |
|           |                                                             |
|           |                                                             |
|           | 0         Honeynet technologies (at least one session)      |
|           |                                                             |
|           |                                                             |
|           | o         Visualization and data representation (at least   |
|           | one session)                                                |
|           |                                                             |
|           |                                                             |
|           | o         Biometrics (at least one session)                 |
|           |                                                             |
|           |                                                             |
|           | o         Secure software technologies                      |
|           |                                                             |
|           |                                                             |
|           | o         Wireless security                                 |
|           |                                                             |
|           |                                                             |
|           | o         Computer forensics                                |
|           |                                                             |
|           |                                                             |
|           | o         Data Protection                                   |
|-----------+-------------------------------------------------------------|
| Experience| o         Educational curriculum                            |
|           |                                                             |
|           |                                                             |
|           | o         Best practices                                    |
|           |                                                             |
|           |                                                             |
|           | o         Information Assurance education and professional  |
|           | development                                                 |
|-----------+-------------------------------------------------------------|

Key Dates...

 6 March 2005  Full papers due for review                                  
                                                                           
 1 April 2005  Acceptance notification and papers returned to authors for  
               corrections                                                 
                                                                           
 15 April 2005 Final papers due                                            
                                                                           
The IEEE Information Assurance Workshop is sponsored by the IEEE SMC, IEEE
Computer Society and the National Security Agency.
It is hosted by the Information Technology and Operations Center of the
United States Military Academy.