The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Deadline Extension for IEEE WETICE STCA Workshop

Fri, February 18, 2005General

By request, the deadline for the IEEE WETICE Security Technologies for Collaborative Architectures (STCA) Workshop has been extended to February 25th, 2005.

You and your colleagues and students are invited to submit papers for the Tenth IEEE International WETICE 2005 Security Technologies for Collaborative Architectures (STCA) Workshop.  The website is open and we are accepting papers for this year’s workshop which will be held at Linkoping University in Sweden.  This website is located at: http://wetice.jpl.nasa.gov/wetice05/index.html. The topics and dates for submission and acceptance are posted below.

The 14th IEEE Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2005) is an annual, international forum for state-of-the-art research in enabling technologies for collaboration. WETICE 2005 will consist of a number of workshops on different topics related to collaboration technology. Each workshop will include paper presentations and working group discussions, keynote sessions and a final joint session to summarize each groups’ findings.

What sets WETICE apart from larger conferences is that the workshops are kept small enough to promote fruitful discussions on the latest technology developments, directions, problems, and requirements. In addition to the accepted papers, the WETICE post-proceedings will also include the summary report produced by each group.

Location:  Linkoping University, Sweden (http://www.liu.se/en)



NEW Extension:  Deadline for Paper Submissions:  February 25, 2005



Submit to:  dpg@jpl.nasa.gov   SUBJECT:  WETICE SCTA PAPER SUBMISSION


Networks and Systems in the information age are becoming increasingly dependent on their information systems to support their business and workflow activities. Technical challenges exist in many areas to support a ubiquitous, distributed infrastructure and Internetworking environment, including challenges in Virus/Worm/Trojan Programs protection, SPAM reduction, Identity Preservation, Role Based Access Control, Cryptography, Application of Principle of Least Privilege in a distributed environment, single-user sign-on and credential authentication/authorization in a distributed application setting.  In addition to such technical challenges, social awareness and legal framework are far from adequate in provide the necessary support for such business model. The aim of this workshop is to bring in experts from those diverse areas in order to address the above challenges in a consorted effort.

This workshop will focus on the problems and challenges relating to security technologies that support secure computing and information sharing in collaborative architectures. We aim to bring together principal players from the security community working in the area of networks, systems and information security as well as non-technical areas such as social and legal aspects of enterprise security.

Papers are requested for submission on Security Issues in Collaborative Enterprise Technologies. Topics to be discussed include but are not restricted to the following areas described below:

STCA Workshop Primary Topics

o Security Models
o Security Frameworks
o Security Processes and Policies
o Security Technologies
o Security Applications
o Secure Grid Computing

Specialized Topics

o Trust and Privacy in Collaboration
o The work and efforts of IETF security groups
o Security of collaborative applications
o Distributed database security
o Trust, privacy and protection

Inter-Organizational Risk Management

o Enterprise security risk management
o Integrating security in the system and software life cycles
o Malicious code and mobile code
o Preventive security
o Social aspects of security
o Legal aspects of privacy and security
o Digital rights Authorization and Digital Signatures
o Cryptography
o Software Certification
o Global key infrastructure
o Public Key Infrastructures
o Secure transactions
o Enterprise security identity management

Communications and Multimedia Security

o Security protocols for the Internet
o Secure applications and environments
o Intrusion detection and management
o Network security
o Security protocol design and analysis
o Secure multimedia communications
o Secure web-hosting collaboration

All submitted papers will be peer-reviewed by a minimum of three people, and the accepted papers will be included in the post-proceedings (to be published by the IEEE Computer Press). Paper submissions should be sent directly to the organizers of the workshop in which you are interested; for submission information, please see the individual workshop pages (to be listed very soon). Paper submissions are not required for participation in the workshops. However, please check the web page of the workshop in which you are interested (http://siplab.csee.wvu.edu/wetice05/workshops.htm).

Submissions



Technical papers:


Authors of technical papers should submit an original paper (not submitted or published elsewhere) in ps or pdf format by email to dpg@jpl.nasa.gov. Submissions should include the title of the paper, the name and affiliation of each author, a 150-word abstract, and no more than 8 keywords. Submissions should not exceed 3000 words in length. The name, position, address, telephone number, and if possible, fax number and e-mail address of the author responsible for correspondence must be included.

Poster papers:


The enterprise security workshop committee invites poster papers on new and exciting research work, work-in-progress and demonstration related to workshop themes. Authors of poster papers should submit an extended abstract by email to dpg@jpl.nasa.gov. Submissions should include the title of the paper, the name and affiliation of each author, a 150-word abstract, and no more than 4 keywords. Submissions should not exceed 1500 words in length. The name, position, address, telephone number, and if possible, fax number and e-mail address of the author responsible for correspondence must be included.

A selection of accepted papers will published in the workshop post-proceedings. Papers accepted for publication in the proceedings are limited to six pages (about 2000-2500 words) in IEEE format (two columns, single spaced, 10pt Times) for technical papers and two pages for poster papers. Authors are strongly encouraged to adhere to this format also when submitting papers. Detailed information on the IEEE format (together with some templates) is available at http://www.computer.org/cspress/instruct.htm.

Please note that each accepted paper should have at least one author register and present the paper at WETICE-2005 to get the paper published in the Proceedings.

All submitted papers are limited to 6 (six) total pages in length.



Important Dates/Deadlines


NEW  Deadline for paper submission to individual workshops: February 25, 2005


Decision to paper authors: March 18, 2005


Final version of accepted papers due to IEEE: May 9, 2005


Advance Registration discount and deadline: To Be Announced Later (On-site registration after this date)


WETICE-2005 Workshops and On-site registration: June 13-15, 2005


Workshop Chairs’ final reports to IEEE: July 8, 2005


Please Submit All Papers for the SCTA Workshop to the following address:  dpg@jpl.nasa.gov with WETICE05 included in the title.  Additional Instructions from IEEE are provided for the submission.

Get Your Degree with CERIAS