Fourth IEEE International
		    Information Assurance Workshop
	      April 13 - 14, 2006  -  Royal Holloway, UK
			http://iwia.org/2006/

Sponsored by the 
IEEE Computer Society Task Force on Information Assurance
in cooperation with the 
ACM Special Interest Group on Security, Audit, and Control

Important Dates

    * Full paper submission due: November 28th, 2005
    * Notification of acceptance: January 27th, 2006
    * Final papers due: February 10th, 2006
    * Works-in-progress due: March 3rd, 2006
    * WIP notification of acceptance: March 24th, 2006
    * Workshop: April 13 - 14, 2006 

Background

Information Assurance (IA) guarantees information delivery under
well-defined constraints and guards against failures caused by the
manner in which information technology (IT) is developed, by malicious
human acts, and by natural disaster.

This workshop is part of a comprehensive IEEE program to realize the
potential of IT to deliver the information it produces and stores with
high assurance. An open forum is provided for contributions covering
research, applications, policy-related issues, and standards on
information assurance and security and underlying technologies.
Overview

The IEEE Task Force on Information Assurance is sponsoring a workshop
on information assurance in cooperation with the ACM SIGSAC on
research and experience in information assurance. The workshop seeks
submissions from academia, government, and industry presenting novel
research, applications and experience, and policy on all theoretical
and practical aspects of IA. Possible topics include, but are not
limited to the following:

    * Operating System IA & S
    * Storage IA & S
    * Network IA & S
    * IA Standardization Approaches
    * Information Sharing in Coalition Settings
    * Security Models
    * Survivability and Resilient Systems
    * Formal Methods and Software Engineering for IA
    * Proactive Approaches to IA
    * CCITSE Experience and Methodology
    * Intrusion Detection, Prediction, and Countermeasures
    * Insider Attack Countermeasures
    * Specification, Design, Development, and Deployment of IA Mechanisms
    * Policy Issues in Information Assurance 

Accepted papers will be published by IEEE Press in a proceedings volume.

Program Committee

Mohamed Eltoweissy 	Virginia Tech, USA
Tim Gibson 	DARPA, USA
Dieter Gollmann U. of Hamburg-Harburg, Germany
Sushil Jajodia 	George Mason University, USA
John James 	United States Military Academy, USA
Paul Karger 	IBM T.J. Watson Labs, USA
Carl Landwehr 	National Science Foundation, USA
Emil Lupu 	Imperial College London, UK
John McDermott 	U.S. Naval Research Laboratory, USA
Peter G. Neumann SRI CSL, USA
Kenny Paterson 	Royal Holloway, UK
Peter Ryan 	University of Newcastle-upon-Tyne, UK
Gene Spafford 	Purdue University, USA
Yuliang Zheng 	U. of North Carolina Charlotte, USA

General Chair
Jack Cole 	US Army Research Laboratory, USA

Program Chair
Stephen D. Wolthusen 	Fraunhofer-IGD, Germany

Work-In-Progress Submissions

Work-in-progress (WIP) reports are intended to provide timely
dissemination of ideas and preliminary research results. WIP will not
be included in the proceedings volume, but will be made available to
workshop attendees and optionally through the IWIA WWW site. WIP
submissions should have at most 5 pages excluding the bibliography and
appendices (using 10pt body text and two-column layout) and should
otherwise meet the formal criteria listed below for full papers.  Full
Paper Submissions

Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any
other conference or workshop with proceedings. The paper must list all
authors and their affiliates on a separate sheet; in case of multiple
authors, the contact author must be indicated. The paper itself must
be blinded. It should begin with a title, a short abstract, and a list
of key words, and its introduction should summarize the contributions
of the paper at a level appropriate for a non-specialist reader.

Submissions should have at most 15 pages excluding the bibliography
and appendices (using 10pt body text and two-column layout), and at
most 20 pages total.

Submissions not meeting these guidelines risk rejection without
consideration of their merits.

Authors must submit a separate assurance argument for their
results. The argument must be no longer than 1024 words of text. Use
of tables and diagrams is encouraged. Arguments will not count as part
of the paper but will be used by the program committee to evaluate the
submission. Work submitted without an assurance argument will not be
accepted.

The assurance argument must explain the threats addressed by the
work. It must address the relationship between the author's work and
the four assurance disciplines of technical, operational, physical,
and personnel security. These relationships should be described in
terms of claims that are enforced and assumptions that are
necessary. The assurance argument must address the impact of tampering
or bypass attempts against the proposed results. Major trust
relationships should be identified as part of the argument.

Papers on development, assurance, or evaluation methodologies should
submit a similar argument explaining the relationship of the proposed
work to the Common Criteria.

There will be a best student paper award pending sufficient
submissions. Please state clearly whether full-time students made
major contributions to a paper at the time of submission. These papers
will, however, be refereed identially with all other submissions.

Submissions and questions should be sent electronically to SWOLTHUSEN@IEEE.ORG