3rd International IEEE Security in Storage Workshop December 13, 2005
Golden Gate Holiday Inn, San Francisco, California USA
Sponsored by the IEEE Computer Society
Task Force on Information Assurance (TFIA) Part of the IEEE Information
Assurance Activities (IEEEIA)
Held In Cooperation and Co-Located With the 4th USENIX Conference on
File and Storage Technologies (FAST05) December 14-16, 2005, San Francisco, CA, USA
In Cooperation with the IEEE Mass Storage Systems Technical Committee (MSSTC)
Meeting the challenge to protect stored information critical to individuals, corporations, and governments is made more difficult by the continually changing uses of storage and the exposure of storage media to adverse conditions.
Example uses include employment of large shared storage systems for cost reduction and, for convenience, wide use of transiently- connected storage devices offering significant capacities and manifested in many forms, often embedded in mobile devices.
Protecting intellectual property, privacy, health records, and military secrets when media or devices are lost, stolen, or captured is critical to information owners.
A comprehensive, systems approach to storage security is required for the activities that rely on storage technology to remain or become viable.
This workshop serves as an open forum to discuss storage threats, technologies, methodologies and deployment.
The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of designing, building and managing secure storage systems; possible topics include, but are not limited to the following:
- Cryptographic Algorithms for Storage
- Cryptanalysis of Systems and Protocols
- Key Management for Sector and File based Storage Systems
- Balancing Usability, Performance and Security concerns
- Unintended Data Recovery
- Attacks on Storage Area Networks and Storage
- Insider Attack Countermeasures
- Security for Mobile Storage
- Defining and Defending Trust Boundaries in Storage
- Relating Storage Security to Network Security
- Database Encryption
- Search on Encrypted Information
The goal of the workshop is to disseminate new research, and to bring together researchers and practitioners from both governmental and civilian areas. Accepted papers will be published by the IEEE Computer Society Press in the workshop proceedings and become part of the IEEE Digital Library.
Workshop Sponsor
- Jack Cole (US Army Research Laboratory, USA)
Program Chair
- James Hughes (StorageTek, USA)
Program Committee
- Don Beaver (USA)
- John Black (University of Colorado, USA)
- Randal Burns (Johns Hopkins University, USA)
- Ronald Dodge (United States Military Academy, USA)
- Kevin Fu (University of Massachusetts Amherst, USA)
- Russ Housley (Vigil Security, USA)
- Yongdae Kim (University of Minnesota, USA)
- Ben Kobler (NASA, USA)
- Noboru Kunihiro (University of Electro-Communications, Japan)
- Arjen Lenstra (Lucent Technologies’ Bell Laboratories and Technische Universiteit Eindhoven, Netherlands)
- Fabio Maino (Cisco Systems, USA)
- Ethan Miller (University of California, Santa Cruz, USA)
- Reagan Moore (University of California, San Diego, USA)
- Dalit Naor (IBM Haifa, Israel)
- Andrew Odlyzko (University of Minnesota, USA)
- Rod Van Meter (Keio University, Japan)
- Tom Shrimpton (Portland State, USA)
- John Viega (Secure Software, USA)
- Erez Zadok (Stony Brook University, USA)
- Yuliang Zheng (University of North Carolina, USA)
Submissions
Papers must begin with the title, authors, affiliations, a short abstract, a list of key words, and an introduction. The introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Papers must be submitted in PDF format less than 4MB in size (final paper has no limit). Email submissions must attach the paper, specify if this is a duplicate work, and be sent to James_Hughes@StorageTek.com
Papers should be at most 12 pages in length including the bibliography, figures, and appendices (using 10pt body text and two- column layout). Authors are responsible for obtaining appropriate clearances. Authors of accepted papers will be asked to sign IEEE copyright release forms. Final submissions must be in camera-ready PostScript or PDF. Authors of accepted papers must guarantee that their paper will be presented at the conference.
Papers that duplicate work that any of the authors have or will publish elsewhere are acceptable for presentation at the workshop. However, only original papers will be considered for publication in the proceedings.
Although full papers are preferred, submissions of extended abstracts describing the final paper will be considered based on merit and assessing the author’s ability to complete the paper within the allotted time.
Important Dates
Paper due: September 1, 2005
Notification of acceptance: October 1, 2005
Workshop paper due: December 1, 2005
Workshop: December 13, 2005
Proceedings paper due: December 20, 2005
Questions should be sent electronically to James_Hughes@StorageTek.com
The Call For Papers is also available on the web at http://ieeeia.org/sisw/2005/index.htm and http://ieeeia.org/sisw/2005/SISW05CFP.pdf