SISW05, the 3rd International IEEE Security in Storage Workshop
james hughes
hughejp at mac.com
Fri Jul 8 18:07:25 EDT 2005
3rd International IEEE Security in Storage Workshop
December 13, 2005
Golden Gate Holiday Inn, San Francisco, California USA
Sponsored by the IEEE Computer Society
Task Force on Information Assurance (TFIA)
Part of the IEEE Information Assurance Activities (IEEEIA)
Held In Cooperation and Co-Located With the
4th USENIX Conference on File and Storage Technologies (FAST05)
December 14-16, 2005, San Francisco, CA, USA
In Cooperation with the
IEEE Mass Storage Systems Technical Committee (MSSTC)
Description
Meeting the challenge to protect stored information critical to
individuals, corporations, and governments is made more difficult by
the continually changing uses of storage and the exposure of storage
media to adverse conditions.
Example uses include employment of large shared storage systems for
cost reduction and, for convenience, wide use of transiently-
connected storage devices offering significant capacities and
manifested in many forms, often embedded in mobile devices.
Protecting intellectual property, privacy, health records, and
military secrets when media or devices are lost, stolen, or captured
is critical to information owners.
A comprehensive, systems approach to storage security is required for
the activities that rely on storage technology to remain or become
viable.
This workshop serves as an open forum to discuss storage threats,
technologies, methodologies and deployment.
The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of designing,
building and managing secure storage systems; possible topics
include, but are not limited to the following:
- Cryptographic Algorithms for Storage
- Cryptanalysis of Systems and Protocols
- Key Management for Sector and File based Storage Systems
- Balancing Usability, Performance and Security concerns
- Unintended Data Recovery
- Attacks on Storage Area Networks and Storage
- Insider Attack Countermeasures
- Security for Mobile Storage
- Defining and Defending Trust Boundaries in Storage
- Relating Storage Security to Network Security
- Database Encryption
- Search on Encrypted Information
The goal of the workshop is to disseminate new research, and to bring
together researchers and practitioners from both governmental and
civilian areas. Accepted papers will be published by the IEEE
Computer Society Press in the workshop proceedings and become part of
the IEEE Digital Library.
Workshop Sponsor
- Jack Cole (US Army Research Laboratory, USA)
Program Chair
- James Hughes (StorageTek, USA)
Program Committee
- Don Beaver (USA)
- John Black (University of Colorado, USA)
- Randal Burns (Johns Hopkins University, USA)
- Ronald Dodge (United States Military Academy, USA)
- Kevin Fu (University of Massachusetts Amherst, USA)
- Russ Housley (Vigil Security, USA)
- Yongdae Kim (University of Minnesota, USA)
- Ben Kobler (NASA, USA)
- Noboru Kunihiro (University of Electro-Communications, Japan)
- Arjen Lenstra (Lucent Technologies' Bell Laboratories and
Technische Universiteit Eindhoven, Netherlands)
- Fabio Maino (Cisco Systems, USA)
- Ethan Miller (University of California, Santa Cruz, USA)
- Reagan Moore (University of California, San Diego, USA)
- Dalit Naor (IBM Haifa, Israel)
- Andrew Odlyzko (University of Minnesota, USA)
- Rod Van Meter (Keio University, Japan)
- Tom Shrimpton (Portland State, USA)
- John Viega (Secure Software, USA)
- Erez Zadok (Stony Brook University, USA)
- Yuliang Zheng (University of North Carolina, USA)
Submissions
Papers must begin with the title, authors, affiliations, a short
abstract, a list of key words, and an introduction. The introduction
should summarize the contributions of the paper at a level
appropriate for a non-specialist reader. Papers must be submitted in
PDF format less than 4MB in size (final paper has no limit). Email
submissions must attach the paper, specify if this is a duplicate
work, and be sent to James_Hughes at StorageTek.com
Papers should be at most 12 pages in length including the
bibliography, figures, and appendices (using 10pt body text and two-
column layout). Authors are responsible for obtaining appropriate
clearances. Authors of accepted papers will be asked to sign IEEE
copyright release forms. Final submissions must be in camera-ready
PostScript or PDF. Authors of accepted papers must guarantee that
their paper will be presented at the conference.
Papers that duplicate work that any of the authors have or will
publish elsewhere are acceptable for presentation at the workshop.
However, only original papers will be considered for publication in
the proceedings.
Although full papers are preferred, submissions of extended abstracts
describing the final paper will be considered based on merit and
assessing the author's ability to complete the paper within the
allotted time.
Important Dates
Paper due: September 1, 2005
Notification of acceptance: October 1, 2005
Workshop paper due: December 1, 2005
Workshop: December 13, 2005
Proceedings paper due: December 20, 2005
Questions should be sent electronically to James_Hughes at StorageTek.com
The Call For Papers is also available on the web at
http://ieeeia.org/sisw/2005/index.htm
http://ieeeia.org/sisw/2005/SISW05CFP.pdf
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list