Call for Papers
		       Third IEEE International
		    Information Assurance Workshop
		       March 31 - April 1, 2005
		 http://iwia.org/2005/CfP_WS2005.html
			   Sponsored by the
      IEEE Computer Society Task Force on Information Assurance
		       in cooperation with the
		ACM Special Interest Group on Security



Important Dates

    * Full paper submission due: November 8th, 2004
    * Notification of acceptance: January 7th, 2005
    * Final papers due: January 21st, 2005
    * Works-in-progress due: February 11th, 2005
    * WIP notification of acceptance: March 4th, 2005
    * Workshop: March 31st - April 1st, 2005 

Background

Information Assurance (IA) guarantees information delivery under
well-defined constraints and guards against failures caused by the
manner in which information technology (IT) is developed, by malicious
human acts, and by natural disaster.

This workshop is part of a comprehensive IEEE program to realize the
potential of IT to deliver the information it produces and stores with
high assurance. An open forum is provided for contributions covering
research, applications, policy-related issues, and standards on
information assurance and security and underlying technologies.

Overview

The IEEE Task Force on Information Assurance is sponsoring a workshop
on information assurance in cooperation with the ACM SIGSAC on
research and experience in information assurance. The workshop seeks
submissions from academia, government, and industry presenting novel
research, applications and experience, and policy on all theoretical
and practical aspects of IA. Possible topics include, but are not
limited to the following:

    * Operating System IA & S
    * Storage IA & S
    * Network IA & S
    * IA Standardization Approaches
    * Information Sharing in Coalition Settings
    * Security Models
    * Survivability and Resilient Systems
    * Formal Methods and Software Engineering for IA
    * Proactive Approaches to IA
    * CCITSE Experience and Methodology
    * Intrusion Detection, Prediction, and Countermeasures
    * Insider Attack Countermeasures
    * Specification, Design, Development, and Deployment of IA Mechanisms
    * Policy Issues in Information Assurance 

Accepted papers will be published by IEEE Press in a proceedings volume.

Program Committee
Blaine Burnham U. of Nebraska Omaha, USA
Yves Deswarte LAAS - CNRS, France
Tim Gibson DARPA, USA
Dieter Gollmann U. of Hamburg-Harburg, Germany
Sushil Jajodia George Mason University, USA
John James United States Military Academy, USA
Paul Karger IBM T.J. Watson Labs, USA
Carl Landwehr National Science Foundation, USA
Emil Lupu Imperial College London, UK
John McDermott U.S. Naval Research Laboratory, USA
Henry L. Owen Georgia Institute of Technology, USA
Peter G. Neumann SRI CSL, USA
Gene Spafford Purdue University, USA
Shambhu Upadhyaya SUNY Buffalo, USA
John Zachary U. of South Carolina, USA
Yuliang Zheng U. of North Carolina Charlotte, USA
General Chair
Jack Cole US Army Research Laboratory, USA
Program Chair
Stephen D. Wolthusen Fraunhofer-IGD, Germany

Work-In-Progress Submissions

Work-in-progress (WIP) reports are intended to provide timely
dissemination of ideas and preliminary research results. WIP will not
be included in the proceedings volume, but will be made available to
workshop attendees and optionally through the IWIA WWW site. WIP
submissions should have at most 5 pages excluding the bibliography and
appendices (using 10pt body text and two-column layout) and should
otherwise meet the formal criteria listed below for full papers.  Full
Paper Submissions

Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any
other conference or workshop with proceedings. The paper must list all
authors and their affiliates on a separate sheet; in case of multiple
authors, the contact author must be indicated. The paper itself must
be blinded. It should begin with a title, a short abstract, and a list
of key words, and its introduction should summarize the contributions
of the paper at a level appropriate for a non-specialist reader.

Submissions should have at most 15 pages excluding the bibliography
and appendices (using 10pt body text and two-column layout), and at
most 20 pages total.

Submissions not meeting these guidelines risk rejection without
consideration of their merits.

Authors must submit a separate assurance argument for their
results. The argument must be no longer than 1024 words of text. Use
of tables and diagrams is encouraged. Arguments will not count as part
of the paper but will be used by the program committee to evaluate the
submission. Work submitted without an assurance argument will not be
accepted.

The assurance argument must explain the threats addressed by the
work. It must address the relationship between the author's work and
the four assurance disciplines of technical, operational, physical,
and personnel security. These relationships should be described in
terms of claims that are enforced and assumptions that are
necessary. The assurance argument must address the impact of tampering
or bypass attempts against the proposed results. Major trust
relationships should be identified as part of the argument.

Papers on development, assurance, or evaluation methodologies should
submit a similar argument explaining the relationship of the proposed
work to the Common Criteria.

Submissions and questions should be sent electronically to IWIA2005@IGD.FHG.DE