Conferences related to Information Assurance

Back to Top

2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA)

Industrial Informatics, Computational Intelligence, Control and Systems, Cyber-physicalSystems, Energy and Environment, Mechatronics, Power Electronics, Signal and InformationProcessing, Network and Communication Technologies


2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)

The 15th annual IEEE SECON conference will provide a unique forum to exchange innovative research ideas, recent results, and share experiences among researchers and practitioners in wireless networks, mobile systems and the Internet of Things. The focus of IEEE SECON is novel communication technologies and emerging applications and services, involving mobile sensing and communication, and ubiquitous and pervasive computing.


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2018 25th IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE Signal Processing Society, is the premier forum for the presentation of technological advances and research results in the fields of theoretical, experimental, and applied image and video processing. ICIP 2018, the 25th in the series that has been held annually since 1994, brings together leading engineers and scientists in image and video processing from around the world.


2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)

This conference is a forum for researchers and designers to present and discuss various aspects of VLSI design, EDA, embedded systems, and enabling technologies. The program will consist of regular paper sessions, special sessions, embedded tutorials, panel discussions, design contest, industrial exhibits and tutorials. This is the premier conference/exhibition in this area in India, attracting designers, EDA professionals, and EDA tool users. The program committee for the conference has a significant representation from the EDA research community and a large fraction of the papers published in this conference are EDA-related


More Conferences

Periodicals related to Information Assurance

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Education, IEEE Transactions on

Educational methods, technology, and programs; history of technology; impact of evolving research on education.


Electron Devices, IEEE Transactions on

Publishes original and significant contributions relating to the theory, design, performance and reliability of electron devices, including optoelectronics devices, nanoscale devices, solid-state devices, integrated electronic devices, energy sources, power devices, displays, sensors, electro-mechanical devices, quantum devices and electron tubes.


More Periodicals

Most published Xplore authors for Information Assurance

Back to Top

Xplore Articles related to Information Assurance

Back to Top

Panel Session - Learning Modules for Security, Privacy and Information Assurance In Undergraduate Engineering Education

[{u'author_order': 1, u'affiliation': u'Cal Poly Pomona', u'full_name': u'Daniel Manson'}, {u'author_order': 2, u'affiliation': u'San Jos\xe9 State University, NSF STC TRUST', u'full_name': u'Sigurd Meldal'}, {u'author_order': 3, u'affiliation': u'Carnegie Mellon University, Software Engineering Institute, CERT', u'full_name': u'Carol Sledge'}, {u'author_order': 4, u'affiliation': u'UC Berkeley, Goldman School of Public Policy', u'full_name': u'Stephen M. Maurer'}, {u'author_order': 5, u'affiliation': u'Stanford Computer Security Lab, Stanford University, NSF STC TRUST', u'full_name': u'John C. Mitchell'}, {u'author_order': 6, u'affiliation': u'Center for Systems Security and Information Assurance', u'full_name': u'Erich Spengler'}, {u'author_order': 7, u'affiliation': u'The Institute for Software Integrated Systems, Vanderbilt University, NSF STC TRUST', u'full_name': u'Janos Sztipanovits'}, {u'author_order': 8, u'affiliation': u'CSU San Bernardino', u'full_name': u'Javier Torner'}] Proceedings. Frontiers in Education. 36th Annual Conference, 2006

Computer trustworthiness continues to increase in importance as a pressing scientific, economic, and social problem. In today's environment, there is heightened awareness of the threat of well-funded professional cyber hackers and the potential for nation-state sponsored cyber warfare. An accelerating trend of the last decade has been the growing integration role of computing and communication in critical infrastructure systems that ...


Infrastructure Challenges in an Information Assurance Education: An Implementation Case

[{u'author_order': 1, u'affiliation': u'Eastern Michigan University, Ypsilanti, USA', u'full_name': u'Liu Hua Yeo'}, {u'author_order': 2, u'affiliation': u'Eastern Michigan University, Ypsilanti, USA', u'full_name': u'Munther Abualkibash'}, {u'author_order': 3, u'affiliation': u'Eastern Michigan University, Ypsilanti, USA', u'full_name': u'James Banfield'}, {u'author_order': 4, u'affiliation': u'Eastern Michigan University, Ypsilanti, USA', u'full_name': u'Suleiman Ashur'}] 2018 IEEE International Conference on Electro/Information Technology (EIT), 2018

This paper describes the infrastructure challenges in implementing an undergraduate information security program at a large Midwestern University. Efforts to overcome those challenges are summarized and future plans to improve the program over time are discussed. Some key challenges for this program have been physical location, inadequacy of the physical infrastructure, budget constraints and the lack of faculty with direct ...


Novel technique for steganography in fingerprints images: Design and implementation

[{u'author_order': 1, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'full_name': u'Hanan Mahmoud'}, {u'author_order': 2, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'full_name': u'Hanan Saad Al-Hulaibah'}, {u'author_order': 3, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'full_name': u'Sarah Ahmad Al-Naeem'}, {u'author_order': 4, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'full_name': u'Suha Ali Al-Qhatani'}, {u'author_order': 5, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'full_name': u'Aljoharah Al-Dawood'}, {u'author_order': 6, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'full_name': u'Buthaina Saleh Al-Nassar'}, {u'author_order': 7, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'full_name': u'Dhay Yousef AL-Salman'}] 2010 Sixth International Conference on Information Assurance and Security, 2010

This paper describes the design and implementation of a project concerning the hiding of messages in images specifically fingerprint images. Fingerprints differentiate one person from another, and one finger from another. Every human being has twenty different fingerprints, and they do not have any similarity throughout the history of mankind. The policy of this project is to keep the confidential ...


Increasing minority participation in information assurance

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. & Inf. Sci., Florida Agric. & Mech. Univ., Tallahassee, FL, USA', u'full_name': u'D.W. Evans'}, {u'author_order': 2, u'affiliation': u'Dept. of Comput. & Inf. Sci., Florida Agric. & Mech. Univ., Tallahassee, FL, USA', u'full_name': u'C.L. Chatmon'}] 2005 6th International Conference on Information Technology Based Higher Education and Training, 2005

In fall semester 2005, the Computer & Information Sciences Department at Florida Agricultural & Mechanical University, a historical black college and university, introduced an information assurance certificate track. The introduction of new courses into any curriculum presents the traditional problems. This paper provides an overview of our experience in establishing an undergraduate information assurance certificate program. Specifically, details are given ...


State observer based adaptive information assurance evaluation model

[{u'author_order': 1, u'affiliation': u'School of Management, Tianjin University, 300072, China', u'full_name': u'Lan Ma'}, {u'author_order': 2, u'affiliation': u'School of Electronics & Information Engineering, Civil Aviation University of China, 300300, China', u'full_name': u'Gang Li'}, {u'author_order': 3, u'affiliation': u'School of Electronics & Information Engineering, Civil Aviation University of China, 300300, China', u'full_name': u'Wei Gao'}] 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010

Information Assurance (IA) is drawing considerable attention of researchers in protecting key intelligent system and state network infrastructure from attacks and intrusion. IA is a complex system engineering, the operation of IA is a dynamic adjust processing. This paper applied the system control theory in the IA to set up a multi-input and multi-output control system with output feedback. In ...


More Xplore Articles

Educational Resources on Information Assurance

Back to Top

eLearning

No eLearning Articles are currently tagged "Information Assurance"

IEEE-USA E-Books

  • About the Author

    No abstract.

  • Traditional Network Concepts

    This chapter contains sections titled: * Networking Architectures * Types of Networks * Network Protocols * Chapter Summary * Further Reading and Resources * Questions * Exercises ]]>

  • SECURITY SYSTEMS ENGINEERING

    This chapter considers how information governance and systems engineering can be applied to achieve information assurance. It looks at vulnerabilities threat agents, attack vectors, and their corresponding impact on risk. A basic component of engineering is the functional or performance-specific detailed requirement. Requirements have to be based on decomposition of policy statements. The security policy provides the foundation for how the organization makes a due diligence effort toward securing assets. Senior management oversight is fundamental to achieving consistent and compliant adherence to the security policy. Involvement of management will facilitate security policy compliance. Employee involvement is necessary to meeting policy mandates. A primary purpose of security management is to ensure that the organization achieves its security goals and objectives, while avoiding unnecessary risks to itself and those it serves. The chapter describes access control and access control structures and looks at simple mathematical structures and their use in access control.

  • Security Systems Engineering

    This chapter contains sections titled: * Security Policy Development * Senior Management Oversight and Involvement * Security Process Management and Standards * Information Security Systems Engineering Methodology * Requirements Analysis and Decomposition * Access Control Concepts * Security Modeling and Security-Related Standards * Chapter Summary * Questions * Exercises ]]>

  • Next-Generation Networks

    This chapter contains sections titled: * Framework and Topology of the NGN * The NGN Functional Reference Model * Relationship between NGN Transport and Service Domains * Enterprise Role Model * Security Allocation within the NGN Transport Stratum Example * Converged Network Management (TMN and eTOM) * General Network Security Architectures * Chapter Summary * Further Reading and Resources * Exercises ]]>

  • Transport and Application Security Design and Use

    This chapter contains sections titled: * Layer 4��-��Transport Security Protocols * Layer 5��-��User Service Application Protocols * Chapter Summary * Further Reading and Resources * Questions * Exercises ]]>

  • About The Author

    No abstract.

  • SECURING MANAGEMENT AND MANAGING SECURITY

    This chapter provides an overview of modern network and infrastructure management as a context to the management of deployed security mechanisms. It discusses the need for management to stay involved in security management activities. This is followed by a discussion of operational security, necessary mechanisms, including forensics, third-party access reviews, and certification. The chapter then examines security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. It also considers the need for compliance relative to security policies that must be adhered to by operations and management personnel. An operational security compliance program exists to ensure that all those business requirements, policy statements, and specific security dictates are being complied with. The chapter concludes with consideration of activities related to security when developing or purchasing functions, subsystems, or complete solutions.

  • WHAT IS SECURITY?

    The central role of computer security for the working of the economy, the defense of the country, and the protection of the individual privacy is universally acknowledged today. Secure information systems must work reliably despite random errors, disturbances, and malicious attacks. This chapter examines a number of general ways of discussing security, including the common body of knowledge (CBK), by-function, and then systems engineering approaches. CBK is the critical body of knowledge that serves as a framework of security concepts, definitions, and principles that foster understanding of best practices among those engaged in activities related to information assurance/security. Confidentiality, integrity, and availability (CIA) are the core tenets of information security and are widespread over all the domains of the CBK. The chapter considers the many general security concepts and complexities associated with issues of safety, and information availability, and enterprise infrastructures. It also discusses some basic perspectives on information security.

  • Authentication of Subjects

    This chapter contains sections titled: * Authentication Systems * Human Authentication * Chapter Summary * Further Reading and Resources * Questions * Exercises ]]>



Standards related to Information Assurance

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


Systems and software engineering -- Software life cycle processes

This International Standard establishes a common framework for software life cycle processes, with welldefined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that are to be applied during the acquisition of a software product or service and during the supply, development, operation, maintenance and disposal of software products. Software includes the software portion ...



Jobs related to Information Assurance

Back to Top