CALL FOR ABSTRACTS
CSIIRW-09
April 13-15, 2009
Fifth Cyber Security and Information Intelligence Research Workshop
At Oak Ridge National Laboratory and The University of Tennessee at Knoxville
Sponsored by:
Federal Business Council, Inc.
University of Tennessee, Department of EECS
National Science Foundation (pending)
In cooperation with ACM and EUROSIS
___________________________________________________________________
IMPORTANT DATES in 2009:
Mar 01 (firm, was Feb 1) Extended abstracts (up to 4 pages) submitted
Mar 20 Author notification
Mar 27 Visitation requests submitted by all attendees (HARD deadline)
Apr 10 Submission of presentation slides (up to 10pg 2 slides/pg) and final
revised extended abstracts
May 29 Publication of CSIIR Workshop Proceedings in ACM Digital
Library (including extended abstracts and presentations)
Jun 15 Submission deadline of full papers (optional) to HICSS
Cyber Security and Information Intelligence Research Minitrack
Preliminary CSIIRM CFP
___________________________________________________________________
SYNOPSIS:
As our dependence on the cyber infrastructure grows ever larger, more complex
and more distributed, the systems that compose it become more prone to failures
and/or exploitation. Intelligence is information valued for its currency and relevance
rather than its detail or accuracy. Information explosion describes the pervasive
abundance of (public/private) information and the effects of such. Gathering,
analyzing, and making use of information constitutes a business- / sociopolitical-
/ military-intelligence activity and ultimately poses significant advantages and
liabilities to the survivability of "our" society. The combination of increased
vulnerability, increased stakes and increased threats make cyber security and
information intelligence (CSII) one of the most important emerging challenges
in the evolution of modern cyberspace "mechanization."
___________________________________________________________________
IMPORTANT GOALS:
The aim of this workshop is to discuss (and publish) novel theoretical and empirical
research focused on (the many) different aspects of software security/dependability,
because as we know, the heart of the cyber infrastructure is software. The scope of
the workshop covers a wide range of methodologies, techniques, and tools (i.e.,
applications) to (1) assure, measure, estimate and predict software security/
dependability and (2) analyze and evaluate the impact of such applications on
software security/dependability.
We encourage researchers and practitioners from a wide swath of professional
areas (not only the programmers, designers, testers, and methodologists but also
the users and risk managers) to participate so that we can better understand the
needs (requirements), stakes and the context of the ever evolving cyber world;
where software forms the core and security/dependability are crucial properties
that must be built-in or baked on and maintained. Secure systems must be
dependable and dependable systems fail if they are not secure. We look to
software engineering to help provide us the products and methods to accomplish
these goals.
___________________________________________________________________
NON-EXCLUSIVE TOPICS
We aim to challenge, establish and debate a far-reaching agenda that broadly
and comprehensively outlines a strategy for cyber security and information
intelligence that is founded on sound principles and technologies, including
and not limited to:
+ Scalable trustworthy systems (including system architectures and requisite
development methodologies)
+ Enterprise-level metrics (including measures of overall system trustworthiness)
+ Life-cycle of System Evaluation methodologies (including approaches for
attaining sufficient assurance)
+ Coping with insider threats
+ Coping with malware
+ Global identity management
+ System survivability
+ Situational awareness and attack attribution
+ Data provenance and integrity (relating to information, systems, and hardware)
+ Privacy-aware security and usable security
___________________________________________________________________
KEYNOTE SPEAKERS:
+ Douglas Maughan, Cyber Security Research Lead, DHS S&T (CID)
+ Eric Cole, Lockheed Martin Fellow
+ Sal Stolfo, Professor of Computer Science, Columbia University
+ Dawn Song, Computer Science Professor, UC Berkley
+ Bhavani Thuaisingham, Director for Cyber Security Research Center,
Professor of Computer Science, University of Texas at Dallas
+ Tiffany Jones, Director, North and Latin American Government Relations at
Symantec Corporation
+ Mike Hinchey, Co-Director, Lero –Irish Software Engineering Research Centre,
Former Director Software Engineering Laboratory, NASA GSFC
+ Keynote Panel Tentative Invitations:
Melissa Hathaway, Sr. Advisor to Director of National Intelligence (ODNI)
Intelligence Advanced Research Projects Activity (IARPA)
___________________________________________________________________
SUBMISSION INSTRUCTIONS:
Participants are invited to submit extended abstracts of no more than four pages
(single-spaced) by February 1.
Read the full instructions: http://www.ioc.ornl.gov/csiirw/ACM-SubmGuidelines.htm
___________________________________________________________________
ORGANZATION:
General Chair:
+ Frederick T. Sheldon, Computational Sciences and Engineering Division
Oak Ridge National Laboratory
Program Co-Chairs:
+ Itamar Arel, Department of EECS
University of Tennessee
+ Ali Mili, College of Computing Science
New Jersey Institute of Technology
+ Axel Krings, Computer Science Department
University of Idaho
No comments:
Post a Comment