<html>
<head>
<meta http-equiv=Content-Type content="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered)">
<style>
<!--
/* Font Definitions */
@font-face
{font-family:Batang;
panose-1:2 3 6 0 0 1 1 1 1 1;}
@font-face
{font-family:"\@Batang";
panose-1:2 3 6 0 0 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman";}
h6
{margin-top:12.0pt;
margin-right:0in;
margin-bottom:3.0pt;
margin-left:0in;
font-size:11.0pt;
font-family:"Times New Roman";
font-weight:bold;}
a:link, span.MsoHyperlink
{color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{color:purple;
text-decoration:underline;}
p
{margin-right:0in;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman";}
span.emailstyle17
{font-family:Arial;
color:windowtext;}
span.EmailStyle19
{font-family:Arial;
color:navy;}
@page Section1
{size:8.5in 11.0in;
margin:.7in .6in .7in .6in;}
div.Section1
{page:Section1;}
-->
</style>
</head>
<body lang=EN-US link=blue vlink=purple>
<div class=Section1>
<h6 align=center style='margin-top:0in;text-align:center'><b><font size=5
face=Arial><span style='font-size:18.0pt;font-family:Arial'>Workshop on
Information Assurance (WIA 2006)</span></font></b></h6>
<p align=center style='margin:0in;margin-bottom:.0001pt;text-align:center'><font
size=2 color=maroon face="Times New Roman"><span style='font-size:11.0pt;
color:maroon'>In conjunction with the 25<sup>th</sup> IEEE International
Performance Computing and Communications Conference (IPCCC)</span></font><font
size=2><span style='font-size:11.0pt'> <a href="http://ipccc.org/">http://ipccc.org/</a>
<br>
Phoenix, Arizona, April 10-12, 2006</span></font></p>
<p align=center style='margin:0in;margin-bottom:.0001pt;text-align:center'><font
size=2 color=navy face=Arial><span style='font-size:10.0pt;font-family:Arial;
color:navy'> </span></font></p>
<p align=center style='margin:0in;margin-bottom:.0001pt;text-align:center'><font
size=2 color=navy face="Times New Roman"><span style='font-size:11.0pt;
color:navy'>Extended Deadline; December 6, 2005</span></font><font size=2><span
style='font-size:11.0pt'> </span></font></p>
<p align=center style='margin-bottom:2.0pt;text-align:center'><b><font size=2
color=teal face="Times New Roman"><span style='font-size:10.0pt;color:teal;
font-weight:bold'>Keynote Speaker</span></font></b><font size=2><span
style='font-size:10.0pt'>: <b><span style='font-weight:bold'>Dr. Carl E.
Landwehr, Program Manager, Advanced Research and Development Agency</span></b></span></font></p>
<p align=center style='margin-right:0in;margin-bottom:12.0pt;margin-left:0in;
text-align:center'><font size=3 face="Times New Roman"><span style='font-size:
12.0pt'> </span></font></p>
<p style='margin:0in;margin-bottom:.0001pt;text-align:justify;text-justify:
inter-ideograph'><b><i><font size=2 face="Times New Roman"><span
style='font-size:10.0pt;font-weight:bold;font-style:italic'>Scope: </span></font></i></b><font
size=2><span style='font-size:10.0pt'>Information Assurance (IA) is defined as
the operations undertaken to protect and defend information and information
systems by ensuring their availability, integrity, authentication,
confidentiality and non-repudiation. Availability implies that networks
and systems must be survivable and fault tolerant – they should possess
redundancies to operate under failures or security breaches. For example,
networks should be designed with sufficient spare and working capacity,
efficient traffic restoration protocols, alarms and network management.
Security encompasses the other aspects of IA, namely integrity, access-control,
authentication, confidentiality and non-repudiation as they apply to both
networks and systems.<font color=green><span style='color:green'> </span></font>The
increasing reliance of business-to-business and business-to-consumer
applications on networked information systems dramatically magnifies the
consequence of damages resulting from even simple system faults and intrusions,
making the task of assuring confidentiality, availability and integrity of
information difficult. Although several piecemeal solutions address concerns
related to the security and fault tolerance of various components of such
networked information systems, there is a growing need to leverage the synergy
between security and survivability to provide a higher level of information
assurance in the face of faults and attacks. We seek papers that address
theoretical, experimental, systems-related and work in-progress in the area of
Information Assurance at the network and system levels. We expect to have three
types of sessions - the first related to survivability and fault tolerance, the
second related to security, and the third related to the interactions between
security and survivability. Papers should describe original, previously
unpublished work, not currently under review by another conference, workshop,
or journal. Papers accepted for presentation will be published in the IPCCC
conference proceedings. The workshop will also include invited papers. Topics
of interest include, but are not limited to:</span></font></p>
<p style='margin-bottom:12.0pt;text-align:justify;text-justify:inter-ideograph'><font
size=3 face="Times New Roman"><span style='font-size:12.0pt'> </span></font></p>
<p class=MsoNormal><font size=3 face="Times New Roman"><span style='font-size:
12.0pt'> </span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:9.0pt'><font size=2
face="Times New Roman"><span style='font-size:10.0pt'>Authorization and
access-control<br>
Web services security</span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:9.0pt'><font size=2
face="Times New Roman"><span style='font-size:10.0pt'>Database and system
security<br>
Risk analysis and security management<br>
Security verification/validation </span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:9.0pt'><font size=2
face="Times New Roman"><span style='font-size:10.0pt'>Wireless LAN Security<br>
Network Restoration techniques </span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:9.0pt'><font size=2
face="Times New Roman"><span style='font-size:10.0pt'>Network
Reliability/Availability </span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:9.0pt'><font size=2
face="Times New Roman"><span style='font-size:10.0pt'>Digital Rights Management
</span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:9.0pt'><font size=2
face="Times New Roman"><span style='font-size:10.0pt'>DoS protection for the
Internet<br>
Cryptographic protocols and Key management </span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:9.0pt'><font size=2
face="Times New Roman"><span style='font-size:10.0pt'>Intrusion Detection
Techniques </span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:9.0pt'><font size=2
face="Times New Roman"><span style='font-size:10.0pt'>Ad hoc sensor network
security<br>
Models and architectures for systems security and survivability </span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:9.0pt'><font size=2
face="Times New Roman"><span style='font-size:10.0pt'>Security and
survivability in optical networks<br>
E/M-commerce security and survivability architectures </span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:9.0pt'><font size=2
face="Times New Roman"><span style='font-size:10.0pt'>Public policy issues for
security and survivability</span></font></p>
<p class=MsoNormal><font size=3 face="Times New Roman"><span style='font-size:
12.0pt'> </span></font></p>
<p style='margin-bottom:2.0pt;text-align:justify;text-justify:inter-ideograph'><b><i><font
size=2 face="Times New Roman"><span style='font-size:10.0pt;font-weight:bold;
font-style:italic'>Instructions for authors: </span></font></i></b><font
size=2><span style='font-size:10.0pt'>Papers reporting original and unpublished
research results on the above and related topics are solicited. All submitted
papers will be refereed for quality, originality and relevance by the Program
Committee. The acceptance/rejection of the papers will be based on the review
results. All questions should be addressed to the PC co-chairs. Authors are
encouraged to submit their papers electronically. An electronic version (PDF format)
of the paper should be submitted by November 22, 2005 to the workshop website.
Manuscripts should be in English and must not exceed 8 pages (IEEE format) for
regular papers and 4 pages (IEEE format) for short papers. Short papers will be
included for presentation in a poster session. A cover page must include a
title, descriptive keywords, all author's names, complete mailing addresses,
telephone numbers, e-mail addresses and an abstract of up to 150 words. Both
regular and short papers accepted for presentation will be published in the
IPCCC conference proceedings. For any further information, please check the
workshop web page at <a href="http://www.sis.pitt.edu/~lersais/WIA2006/">http://www.sis.pitt.edu/~lersais/WIA2006/</a>
or send e-mail to one of the program co-chairs. Inviting selected papers for an
edited book is being planned</span></font></p>
<table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0
style='border-collapse:collapse'>
<tr>
<td width=348 valign=top style='width:261.0pt;padding:0in 5.4pt 0in 5.4pt'>
<p style='margin:0in;margin-bottom:.0001pt'><b><font size=2
face="Times New Roman"><span style='font-size:10.0pt;font-weight:bold'> </span></font></b></p>
<p style='margin:0in;margin-bottom:.0001pt'><b><font size=2
face="Times New Roman"><span style='font-size:10.0pt;font-weight:bold'>General
Chair</span></font></b></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:.25in'><font
size=2 face="Times New Roman"><span style='font-size:10.0pt'>David Tipper <a
href="mailto:%28dtipper@mail.sis.pitt.edu">(dtipper@mail.sis.pitt.edu</a>)</span></font></p>
<p style='margin-bottom:2.0pt'><b><font size=2 face="Times New Roman"><span
style='font-size:10.0pt;font-weight:bold'>Program Co-chairs:</span></font></b></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:.25in'><font
size=2 face="Times New Roman"><span lang=FR style='font-size:10.0pt'>James
Joshi </span></font><font size=2><span style='font-size:10.0pt'><a
href="mailto:%28jjoshi@mail.sis.pitt.edu"><span lang=FR>(jjoshi@mail.sis.pitt.edu</span></a></span></font><font
size=2><span lang=FR style='font-size:10.0pt'>)</span></font></p>
<p style='margin-right:0in;margin-bottom:2.0pt;margin-left:.25in'><font
size=2 face="Times New Roman"><span lang=SV style='font-size:10.0pt'>Prashant
Krishnamurthy </span></font><font size=2><span style='font-size:10.0pt'><a
href="mailto:%28prashant@mail.sis.pitt.edu"><span lang=SV>(prashant@mail.sis.pitt.edu</span></a></span></font><font
size=2><span lang=SV style='font-size:10.0pt'>)</span></font></p>
<p style='margin-right:0in;margin-bottom:0in;margin-left:.25in;margin-bottom:
.0001pt'><font size=2 face="Times New Roman"><span style='font-size:10.0pt'>Yi
Qian (<a href="mailto:yqian@ece.uprm.edu">yqian@ece.uprm.edu</a>)</span></font></p>
<p style='margin-right:0in;margin-bottom:0in;margin-left:.25in;margin-bottom:
.0001pt'><font size=2 face="Times New Roman"><span lang=DE style='font-size:
10.0pt'>Jun Wang (<a href="mailto:wangj@pecos.ncsa.uiuc.edu">wangj@pecos.ncsa.uiuc.edu</a>)
</span></font></p>
<p style='margin-right:0in;margin-bottom:0in;margin-left:.25in;margin-bottom:
.0001pt'><font size=2 face="Times New Roman"><span style='font-size:10.0pt'>William
Yurcik (<a href="mailto:byurcik@ncsa.uiuc.edu">byurcik@ncsa.uiuc.edu</a>)</span></font></p>
</td>
<td width=348 valign=top style='width:261.0pt;padding:0in 5.4pt 0in 5.4pt'>
<p style='margin-bottom:2.0pt'><b><font size=2 face="Times New Roman"><span
style='font-size:10.0pt;font-weight:bold'> </span></font></b></p>
<p style='margin-bottom:12.0pt'><b><font size=2 face="Times New Roman"><span
style='font-size:10.0pt;font-weight:bold'>Important Dates:</span></font></b><font
size=2><span style='font-size:10.0pt'><br>
Deadlines for Submissions: <s>November 22<sup>nd</sup></s>, <font
color=navy><span style='color:navy'>December 6, </span></font>2005<br>
Notification of Acceptance: January 10<sup>th</sup>, 2006<br>
Camera-Ready Copy Received: January 26<sup>th</sup>, 2006</span></font></p>
</td>
</tr>
</table>
<p style='margin-bottom:2.0pt;text-align:justify;text-justify:inter-ideograph'><font
size=3 face="Times New Roman"><span style='font-size:12.0pt'> </span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'> </span></font></p>
</div>
</body>
</html>