************************************************************************************************
IAS 2010 - Second Call For Papers
The Six International Conference on Information Assurance and Security
August 23-25, 2010 -- Atlanta, GA, USA
http://www.mirlabs.org/ias10/
http://www.mirlabs.net/ias10/
Venue: Georgia Tech Learning Center, Atlanta
Technically Co-sponsored by: IEEE Intelligent Transportation Systems Society
************************************************************************************************
1. IMPORTANT DATES
* Extended Deadline for workshop proposal: April 30, 2010
* Extended Deadline for submission of full papers: April 30, 2010
* Acceptance notification: May 30, 2010
* Final camera-ready papers due: June 15, 2010
2. SUBMISSION
Link: http://www.edas.info/newPaper.php?c=8622
* A submitted paper should present high-quality and previously
unpublished work, and
should not be submitted to other conferences or journals in the same time.
3. CO-CHAIRS
* General Chairs:
Ashraf Saad, Armstrong Atlantic State University, USA (Email:
[log in to unmask])
Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), Europe (Email:
[log in to unmask])
Dharma Agrawal, University of Cincinatti, USA (Email: [log in to unmask])
* Program Chairs:
Huirong Fu, Oakland University, USA (Email: [log in to unmask])
Daniel Zeng, University of Arizona, USA (Email: [log in to unmask])
Emilio Corchado, University of Salamanca, Spain (Email: [log in to unmask])
4. SCOPE
Information assurance and security has become an important research issue in the
networked and distributed information sharing environments. Finding
effective ways to
protect information systems, networks and sensitive data within the
critical information
infrastructure is challenging even with the most advanced technology and trained
professionals.
The International Conference on Information Assurance and Security
(IAS) aims to bring
together researchers, practitioners, developers, and policy makers
involved in multiple
disciplines of information security and assurance to exchange ideas
and to learn the latest
development in this important field.
IAS'10 builds on the success of last year's. IAS'09 was held during
August 18-20, 2009 in
Xi'ian China and attracted participants from several countries.
5. CALL FOR REGULAR SESSION PAPERS:
Prospective authors are invited to submit their full-length papers
electronically through
the conference website. Each paper should be concise, but contain
sufficient detail and
references to allow critical review. Each paper will be judged by at
least three referees.
6. CALL FOR SPECIAL SESSIONS:
The goal of Special Sessions (SS) is to provide a focused discussion
of new or innovative
topics. SS organizer(s) must collect at least five papers. SS papers
will be reviewed with
the same criteria as Regular Session papers.
7. TOPICS OF INTEREST
The topics include but are not limited to:
Information Assurance, Security Mechanisms, Methodologies and Models:
Authentication and Identity
Management Authorization and Access Control
Trust Negotiation, Establishment and Management
Anonymity and User Privacy
Data Integrity and Privacy
Network Security
Operating System Security
Database Security
Intrusion Detection
Security Attacks
Security Oriented System Design
Security and Performance trade-off
Security Management and Strategy
Security Verification, Evaluations and Measurements
Secure Software Technologies
New Ideas and Paradigms for Security
Cryptography
Cryptographic Protocols
Key Management and Recovery
Secure System Architectures and Security Application:
Web Services Security
GRID Security
Ubiquitous Computing Security
Mobile Agent Security
Internet Security
Intellectual Property Protection
E-Commerce Security
E-Government Security
E-Health Security
Home System Security
Sensor Network Security
Ad hoc network security
Biometrics Security and Applications
Secure Hardware and Smartcards
Image Engineering, Multimedia Signal Processing and Communication Security:
Multimedia Security
Multimedia Forensic
Digital Watermarking and DRM
Communication Security
Biometrics
Information Fusion
Image Registration
Image Mosaic
For more detailed information, please visit the conference Web page:
http://www.mirlabs.org/ias10 or http://www.mirlabs.net/ias10
|