WIAS 2011 - The International Workshop on Information Assurance and Security (WIAS-11)
Topics/Call fo Papers
The 1st International Workshop on Information Assurance and Security (WIAS-11) will take place in conjunction with the 2nd International Conference on Ambient Systems, Networks and Technologies (ANT-2011), Niagara Falls, Ontario, Canada.
Information assurance and security has become an imperative research issue in the networked and distributed information sharing environments. The progressive dependence of global economic infrastructure on information technology result in an increase of security attacks on networked and distributed information systems. The most advanced technology and highly trained professionals think it challenging to find the effective ways to protect information systems, networks and sensitive data within the critical information infrastructure. There is a need to discover innovative ideas and technology for classification of information assets, risk assessment and risk management plan to provide an information assurance and security to information systems.
Topics of interest include, but are not limited to:
Authentication and access contro
Primitives for cryptographic protocols
Secure system engineering
Secure routing and transport protocols
Secure data aggregation
Secure information processing
Key management
Secure bootstrapping
Secure group communication
Trust Management
Biometrics
Computer Forensics
Digital Signatures
Intrusion Detection System
Public Key Cryptosystems
Wireless Sensor Network Security
Personal Network Security
Mobile and Ad hoc Network Security
Data Mining for Security
Multimedia Security
E-Business Assurance
Internet Security
Reputation Management
Secure real-world applications
Security policy and enforcement issues
Incentive-aware secure protocol design
Mobile platform and systems security
Information assurance and security has become an imperative research issue in the networked and distributed information sharing environments. The progressive dependence of global economic infrastructure on information technology result in an increase of security attacks on networked and distributed information systems. The most advanced technology and highly trained professionals think it challenging to find the effective ways to protect information systems, networks and sensitive data within the critical information infrastructure. There is a need to discover innovative ideas and technology for classification of information assets, risk assessment and risk management plan to provide an information assurance and security to information systems.
Topics of interest include, but are not limited to:
Authentication and access contro
Primitives for cryptographic protocols
Secure system engineering
Secure routing and transport protocols
Secure data aggregation
Secure information processing
Key management
Secure bootstrapping
Secure group communication
Trust Management
Biometrics
Computer Forensics
Digital Signatures
Intrusion Detection System
Public Key Cryptosystems
Wireless Sensor Network Security
Personal Network Security
Mobile and Ad hoc Network Security
Data Mining for Security
Multimedia Security
E-Business Assurance
Internet Security
Reputation Management
Secure real-world applications
Security policy and enforcement issues
Incentive-aware secure protocol design
Mobile platform and systems security
Other CFPs
- sixth annual workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS)
- The Eighth Spring Researchers Colloquium on Databases and Information Systems
- ISC 2011 : International Supercomputing Conference
- LBBIS12: Special Track on LEARNING-BASED BIOMEDICAL INFORMATION SYSTEMS
- FGS 2012 : Federation of Genealogical Societies 2012 Conference
Last modified: 2011-02-18 14:49:16