SISW05, the 3rd International IEEE Security in Storage Workshop

james hughes hughejp at mac.com
Fri Jul 8 18:07:25 EDT 2005


3rd International IEEE Security in Storage Workshop
December 13, 2005
Golden Gate Holiday Inn, San Francisco, California USA

Sponsored by the IEEE Computer Society
  Task Force on Information Assurance (TFIA)
  Part of the IEEE Information Assurance Activities (IEEEIA)

Held In Cooperation and Co-Located With the
4th USENIX Conference on File and Storage Technologies (FAST05)
  December 14-16, 2005, San Francisco, CA, USA

In Cooperation with the
  IEEE Mass Storage Systems Technical Committee (MSSTC)

Description

Meeting the challenge to protect stored information critical to  
individuals, corporations, and governments is made more difficult by  
the continually changing uses of storage and the exposure of storage  
media to adverse conditions.

Example uses include employment of large shared storage systems for  
cost reduction and, for convenience, wide use of transiently- 
connected storage devices offering significant capacities and  
manifested in many forms, often embedded in mobile devices.

Protecting intellectual property, privacy, health records, and  
military secrets when media or devices are lost, stolen, or captured  
is critical to information owners.

A comprehensive, systems approach to storage security is required for  
the activities that rely on storage technology to remain or become  
viable.

This workshop serves as an open forum to discuss storage threats,  
technologies, methodologies and deployment.

The workshop seeks submissions from academia and industry presenting  
novel research on all theoretical and practical aspects of designing,  
building and managing secure storage systems; possible topics  
include, but are not limited to the following:
- Cryptographic Algorithms for Storage
- Cryptanalysis of Systems and Protocols
- Key Management for Sector and File based Storage Systems
- Balancing Usability, Performance and Security concerns
- Unintended Data Recovery
- Attacks on Storage Area Networks and Storage
- Insider Attack Countermeasures
- Security for Mobile Storage
- Defining and Defending Trust Boundaries in Storage
- Relating Storage Security to Network Security
- Database Encryption
- Search on Encrypted Information

The goal of the workshop is to disseminate new research, and to bring  
together researchers and practitioners from both governmental and  
civilian areas. Accepted papers will be published by the IEEE  
Computer Society Press in the workshop proceedings and become part of  
the IEEE Digital Library.

Workshop Sponsor
- Jack Cole (US Army Research Laboratory, USA)

Program Chair
- James Hughes (StorageTek, USA)

Program Committee
- Don Beaver (USA)
- John Black (University of Colorado, USA)
- Randal Burns (Johns Hopkins University, USA)
- Ronald Dodge (United States Military Academy, USA)
- Kevin Fu (University of Massachusetts Amherst, USA)
- Russ Housley (Vigil Security, USA)
- Yongdae Kim (University of Minnesota, USA)
- Ben Kobler (NASA, USA)
- Noboru Kunihiro (University of Electro-Communications, Japan)
- Arjen Lenstra (Lucent Technologies' Bell Laboratories and
      Technische Universiteit Eindhoven, Netherlands)
- Fabio Maino (Cisco Systems, USA)
- Ethan Miller (University of California, Santa Cruz, USA)
- Reagan Moore (University of California, San Diego, USA)
- Dalit Naor (IBM Haifa, Israel)
- Andrew Odlyzko (University of Minnesota, USA)
- Rod Van Meter (Keio University, Japan)
- Tom Shrimpton (Portland State, USA)
- John Viega (Secure Software, USA)
- Erez Zadok (Stony Brook University, USA)
- Yuliang Zheng (University of North Carolina, USA)

Submissions

Papers must begin with the title, authors, affiliations, a short  
abstract, a list of key words, and an introduction. The introduction  
should summarize the contributions of the paper at a level  
appropriate for a non-specialist reader. Papers must be submitted in  
PDF format less than 4MB in size (final paper has no limit). Email  
submissions must attach the paper, specify if this is a duplicate  
work, and be sent to James_Hughes at StorageTek.com

Papers should be at most 12 pages in length including the  
bibliography, figures, and appendices (using 10pt body text and two- 
column layout). Authors are responsible for obtaining appropriate  
clearances. Authors of accepted papers will be asked to sign IEEE  
copyright release forms. Final submissions must be in camera-ready  
PostScript or PDF. Authors of accepted papers must guarantee that  
their paper will be presented at the conference.

Papers that duplicate work that any of the authors have or will  
publish elsewhere are acceptable for presentation at the workshop.  
However, only original papers will be considered for publication in  
the proceedings.

Although full papers are preferred, submissions of extended abstracts  
describing the final paper will be considered based on merit and  
assessing the author's ability to complete the paper within the  
allotted time.

Important Dates

Paper due: September 1, 2005
Notification of acceptance: October 1, 2005
Workshop paper due: December 1, 2005
Workshop: December 13, 2005
Proceedings paper due: December 20, 2005

Questions should be sent electronically to James_Hughes at StorageTek.com

The Call For Papers is also available on the web at
     http://ieeeia.org/sisw/2005/index.htm
     http://ieeeia.org/sisw/2005/SISW05CFP.pdf


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list