Yasemin Erden on BBC

AISB Committee member, and Philosophy Programme Director and Lecturer, Dr Yasemin J. Erden interviewed for the BBC on 29 October 2013. Speaking on the Today programme for BBC Radio 4, as well as the Business Report for BBC world N...


Read More...

Mark Bishop on BBC ...

Mark Bishop, Chair of the Study of Artificial Intelligence and the Simulation of Behaviour, appeared on Newsnight to discuss the ethics of ‘killer robots’. He was approached to give his view on a report raising questions on the et...


Read More...

AISB YouTube Channel

The AISB has launched a YouTube channel: http://www.youtube.com/user/AISBTube (http://www.youtube.com/user/AISBTube). The channel currently holds a number of videos from the AISB 2010 Convention. Videos include the AISB round t...


Read More...

Lighthill Debates

The Lighthill debates from 1973 are now available on YouTube. You need to a flashplayer enabled browser to view this YouTube video  


Read More...
0123

Notice

AISB event Bulletin Item

CFP: 3rd International Workshop on Information Assurance (WIA 2007)

http://www.sis.pitt.edu/~lersais/WIA2007/


Call for Papers
---------------

The 3rd International Workshop on Information Assurance (WIA 2007)
In conjunction with the 26th IEEE International Performance Computing and Communications Conference (IPCCC)
April 11-13, 2007 - New Orleans, Louisiana, USA
URL: http://www.sis.pitt.edu/~lersais/WIA2007/
Paper Submission Due: December 14, 2006


Scope: Information Assurance (IA) is defined as the operations undertaken to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and non-repudiation. Availability implies that networks and systems must be survivable and fault tolerant - they should possess redundancies to operate under failures or security breaches. For example, networks should be designed with sufficient spare and working capacity, efficient traffic restoration protocols, alarms and network management. Security encompasses the other aspects of IA, namely integrity, access-control, authentication, confidentiality and non-repudiation as they apply to both networks and systems. The increasing reliance of business-to-business and business-to-consumer applications on networked information systems dramatically magnifies the consequence of damages resulting from even simple system faults and intrusions, making the task of assuring confidentiality, availability and integrity of information difficult. Although several piecemeal solutions address concerns related to the security and fault tolerance of various components of such networked information systems, there is a growing need to leverage the synergy between security and survivability to provide a higher level of information assurance in the face of faults and attacks. We seek papers that address theoretical, experimental, systems-related and work in-progress in the area of Information Assurance at the network and system levels. We expect to have three types of sessions - the first related to survivability and fault tolerance, the second related to security, and the third related to the interactions between security and survivability. Papers should describe original, previously unpublished work, not currently under review by another conference, workshop, or journal. Papers accepted for presentation will be published in the IPCCC conference proceedings. The workshop will also include invited papers. Topics of interest include, but are not limited to:

- Authorization and access-control
- Web services security
- Database and system security
- Risk analysis and security management
- Security verification/validation
- Wireless Security & Survivability
- Network Restoration techniques
- Network Reliability/Availability
- Digital Rights Management
- DoS protection for the Internet
- Cryptographic protocols and Key management
- Intrusion Detection Techniques
- Ad hoc sensor network security
- Models and architectures for systems security and survivability
- Security / survivability in optical networks
- E/M-commerce security and survivability architectures
- Public policy issues for security and survivability
- Botnets detection and response
- Trust negotiation/management
- Privacy models and mechanisms

Instructions for authors: Papers reporting original and unpublished research results on the above and related topics are solicited. All submitted papers will be refereed for quality, originality and relevance by the Program Committee. The acceptance/rejection of the papers will be based on the review results. All questions should be addressed to the PC co-chairs. Authors are encouraged to submit their papers electronically. An electronic version (PDF format) of the paper should be submitted by December 14, 2006 to the workshop website. Manuscripts should be in English and must not exceed 8 pages (IEEE format) for regular papers and 4 pages (IEEE format) for short papers. Short papers will be included for presentation in a poster session. A cover page must include a title, descriptive keywords, all author's names, complete mailing addresses, telephone numbers, e-mail addresses and an abstract of up to 150 words. Both regular and short papers accepted for presentation will be published in the IPCCC conference proceedings. For any further information, please check the workshop web page at http://www.sis.pitt.edu/~lersais/WIA2007/ or send e-mail to one of the program co-chairs.
Inviting selected papers for an edited book is being planned.


Important Dates:

- Submission Deadline: 		December 14, 2006 (Extended)
- Notification of Acceptance:	January 6, 2007
- Camera-Ready Copy Received:	January 26, 2007
- Workshop Date:			April 11-13, 2007

General Chairs:
David Tipper, University of Pittsburgh (dtipper@mail.sis.pitt.edu)
Prashant Krishnamurthy, University of Pittsburgh (prashant@mail.sis.pitt.edu)


Program Co-chairs:
- James Joshi, University of Pittsburgh, (jjoshi@mail.sis.pitt.edu)
- Yi Qian, University of Puerto Rico, (yqian@ece.uprm.edu)
- Jun Wang, Microsoft Corporation, (jun.y.wang@gmail.com)
- William Yurcik, Army Research Lab, (yurcik@acm.org)