WIA-2007: The 3rd International Workshop on Information Assurance (WIA 2007)
To be held in conjunction with the 26th IEEE International Performance 
Computing and Communications Conference (IPCCC), April 11-13, 2007 - New 
Orleans, Louisiana, USA
(Paper Submission Due: November 30, 2006)

Information Assurance (IA) is defined as the operations undertaken to 
protect and defend information and information systems by ensuring their 
availability, integrity, authentication, confidentiality and 
non-repudiation. Availability implies that networks and systems must be 
survivable and fault tolerant – they should possess redundancies to 
operate under failures or security breaches. For example, networks 
should be designed with sufficient spare and working capacity, efficient 
traffic restoration protocols, alarms and network management. Security 
encompasses the other aspects of IA, namely integrity, access-control, 
authentication, confidentiality and non-repudiation as they apply to 
both networks and systems. The increasing reliance of 
business-to-business and business-to-consumer applications on networked 
information systems dramatically magnifies the consequence of damages 
resulting from even simple system faults and intrusions, making the task 
of assuring confidentiality, availability and integrity of information 
difficult. Although several piecemeal solutions address concerns related 
to the security and fault tolerance of various components of such 
networked information systems, there is a growing need to leverage the 
synergy between security and survivability to provide a higher level of 
information assurance in the face of faults and attacks. We seek papers 
that address theoretical, experimental, systems-related and work 
in-progress in the area of Information Assurance at the network and 
system levels. We expect to have three types of sessions - the first 
related to survivability and fault tolerance, the second related to 
security, and the third related to the interactions between security and 
survivability. Papers should describe original, previously unpublished 
work, not currently under review by another conference, workshop, or 
journal. Papers accepted for presentation will be published in the IPCCC 
conference proceedings. The workshop will also include invited papers. 
Topics of interest include, but are not limited to:

- Authorization and access control
- Web services security
- Database and system security
- Risk analysis and security management
- Security verification/validation
- Wireless Security & Survivability
- Network Restoration techniques
- Network Reliability/Availability
- Digital Rights Management
- DoS protection for the Internet
- Cryptographic protocols and Key management
- Intrusion Detection Techniques
- Ad hoc sensor network security
- Models and architectures for systems security and survivability
- Security / survivability in optical networks
- E/M-commerce security and survivability architectures
- Public policy issues for security and survivability
- Botnets detection and response
- Trust negotiation/management
- Privacy models and mechanisms

For more information, please see: For more information, please see: