Conferences related to Information Assurance

Back to Top

2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA)

Industrial Informatics, Computational Intelligence, Control and Systems, Cyber-physicalSystems, Energy and Environment, Mechatronics, Power Electronics, Signal and InformationProcessing, Network and Communication Technologies


2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)

The 15th annual IEEE SECON conference will provide a unique forum to exchange innovative research ideas, recent results, and share experiences among researchers and practitioners in wireless networks, mobile systems and the Internet of Things. The focus of IEEE SECON is novel communication technologies and emerging applications and services, involving mobile sensing and communication, and ubiquitous and pervasive computing.


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2018 25th IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE Signal Processing Society, is the premier forum for the presentation of technological advances and research results in the fields of theoretical, experimental, and applied image and video processing. ICIP 2018, the 25th in the series that has been held annually since 1994, brings together leading engineers and scientists in image and video processing from around the world.


2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)

This conference is a forum for researchers and designers to present and discuss various aspects of VLSI design, EDA, embedded systems, and enabling technologies. The program will consist of regular paper sessions, special sessions, embedded tutorials, panel discussions, design contest, industrial exhibits and tutorials. This is the premier conference/exhibition in this area in India, attracting designers, EDA professionals, and EDA tool users. The program committee for the conference has a significant representation from the EDA research community and a large fraction of the papers published in this conference are EDA-related


More Conferences

Periodicals related to Information Assurance

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Education, IEEE Transactions on

Educational methods, technology, and programs; history of technology; impact of evolving research on education.


Electron Devices, IEEE Transactions on

Publishes original and significant contributions relating to the theory, design, performance and reliability of electron devices, including optoelectronics devices, nanoscale devices, solid-state devices, integrated electronic devices, energy sources, power devices, displays, sensors, electro-mechanical devices, quantum devices and electron tubes.


More Periodicals

Most published Xplore authors for Information Assurance

Back to Top

Xplore Articles related to Information Assurance

Back to Top

Factors affecting the implementation of information assurance for eGovernment in Indonesia

[{u'author_order': 1, u'affiliation': u'School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom', u'full_name': u'Rio Guntur Utomo'}, {u'author_order': 2, u'affiliation': u'School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom', u'full_name': u'Robert J Walters'}, {u'author_order': 3, u'affiliation': u'School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom', u'full_name': u'Gary B Wills'}] 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), None

Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuity in the event of an ...


Exploring information assurance to support electronic health record systems

[{u'author_order': 1, u'affiliation': u'University of Fort Hare, 50 Church street, East London, 5201, South Africa', u'full_name': u'Liezel Cilliers'}] 2017 IST-Africa Week Conference (IST-Africa), None

Electronic Health Records (EHRs) provide continuity of care as all the patient health information is stored in one place. Patients and health care staff have privacy concerns regarding EHRs as they are not informed how the information in the system is protected. Information assurance is a holistic approach to the protection of data in a EHR. This paper makes use ...


Resilience of the Internet of Things (IoT) from an Information Assurance (IA) perspective

[{u'author_order': 1, u'affiliation': u'Cyber Security Unit (BUCSU), Bournemouth University, Poole, UK', u'full_name': u'Rebecca Rogers'}, {u'author_order': 2, u'affiliation': u'Dept. of Computing and Informatics, Bournemouth University, Poole, UK', u'full_name': u'Edward Apeh'}, {u'author_order': 3, u'affiliation': u'Cyber Security Unit (BUCSU), Bournemouth University, Poole, UK', u'full_name': u'Christopher J. Richardson'}] 2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA), None

Internet infrastructure developments and the rise of the IoT Socio-Technical Systems (STS) have frequently generated more unsecure protocols to facilitate the rapid intercommunication between the plethoras of IoT devices. Whereas, current development of the IoT has been mainly focused on enabling and effectively meeting the functionality requirement of digital-enabled enterprises we have seen scant regard to their IA architecture, marginalizing ...


Evidence accrual technique for information assurance

[{u'author_order': 1, u'affiliation': u'Advanced Programs, Oakridge Technology, San Diego, CA', u'full_name': u'Stephen C. Stubberud'}, {u'author_order': 2, u'affiliation': u'Department of Electrical Engineering, University of San Diego, San Diego, CA', u'full_name': u'Kathleen A. Kramer'}] 2016 IEEE International Carnahan Conference on Security Technology (ICCST), None

Information assurance is the process of protecting information from theft, destruction, or manipulation. While many attacks are straightforward such as denial of service or viruses in that they require just a step or two to implement, more dangerous can require numerous steps to implement. Often, these steps need not be done in quick succession or even in a definite order. ...


Integrate Hacking Technique into Information Assurance Education

[{u'author_order': 1, u'affiliation': u'TSYS Sch. of Comput. Sci., Columbus State Univ., Columbus, GA, USA', u'full_name': u'Jianhua Yang'}, {u'author_order': 2, u'affiliation': u'TSYS Sch. of Comput. Sci., Columbus State Univ., Columbus, GA, USA', u'full_name': u'Yien Wang'}, {u'author_order': 3, u'affiliation': u'Polytech. Sch. of Eng., New York Univ., New York, NY, USA', u'full_name': u'Thomas Reddington'}] 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), None

It has become a trend that more and more institutions offer offensive techniques in information assurance education. In this paper, up the discussion of network mapping and vulnerability scanning, gaining access to a target via vulnerability exploitation, and maintaining an access to a victim host through HackerDefender rootkit techniques, we propose integrating the hacking techniques into information security education. Five ...


More Xplore Articles

Educational Resources on Information Assurance

Back to Top

eLearning

No eLearning Articles are currently tagged "Information Assurance"

IEEE-USA E-Books

  • SECURITY SYSTEMS ENGINEERING

    This chapter considers how information governance and systems engineering can be applied to achieve information assurance. It looks at vulnerabilities threat agents, attack vectors, and their corresponding impact on risk. A basic component of engineering is the functional or performance-specific detailed requirement. Requirements have to be based on decomposition of policy statements. The security policy provides the foundation for how the organization makes a due diligence effort toward securing assets. Senior management oversight is fundamental to achieving consistent and compliant adherence to the security policy. Involvement of management will facilitate security policy compliance. Employee involvement is necessary to meeting policy mandates. A primary purpose of security management is to ensure that the organization achieves its security goals and objectives, while avoiding unnecessary risks to itself and those it serves. The chapter describes access control and access control structures and looks at simple mathematical structures and their use in access control.

  • NEXT-GENERATION NETWORKS

    Service providers (SPs) are rapidly evolving from the classic time division multiplexing (TDM)-based public switched telephone networks (PSTN) to packet- based next-generation networks (NGNs) that rely on numerous access technologies and provide a wide array of customer/subscriber/user services. This chapter provides a brief overview of the functional capabilities and architecture of standards-based NGNs. The NGN architecture supports the notion that multiple NGN core/services networks may be used to provide an end-to-end service to the user. An SP core/services network contains functional capabilities that are part of both the transport stratum and what the NGN architecture calls the service stratum. The primary purpose of an enterprise model is to identify interfaces that are likely to be of general commercial importance. The enhanced Telecom Operations Map (eTOM) begins at the enterprise level and defines business processes in a series of groupings within a hierarchical decomposition to structure the business processes.

  • SECURITY SYSTEMS DESIGN¿¿-¿¿DESIGNING NETWORK SECURITY

    This chapter first examines protocol layers 1,2, and 3 of the available security mechanisms and explores their deployment possibilities within networking protocols. Network Physical layer media types include: metallic or fiber-optic cables/wires used for interconnecting network elements; radio frequency signals transmitted through air used for wireless communications; or visible, or invisible, laser light signals transmitted through air or water. Within the Data Link layer, the encountered security devices are IEEE 802.1x, IEEE 802. 1ae and IEEE 802.11 WPA and 802.11i. The chapter then considers the security capabilities, uses, and deficiencies for each of these technologies. Next, it covers the advantages and limitations of providing security at the Network layer, via the IP security (IPsec) framework of protocols, for secure channel establishment. Finally, the filtering and inspection of packets are discussed as forms of network and host access control (authorization).

  • About The Author

    No abstract.

  • Front Matter

  • GENERAL COMPUTER SECURITY ARCHITECTURE

    This chapter considers security capabilities within computing and communications devices. It considers the software that resides next to the hardware and controls the use of system resources by applications. The networking subsystem supported by the element software is responsible for the confidentiality and integrity of information transferred among elements, for the authentication of elements to one another, and for user authentication and access control in distributed systems. The chapter focuses on the element security software components, primarily for the kernel, security contexts, security-critical functions, and operating system (OS) implementations. OS implementations structured to use the common kernel interface to obtain basic services should be able to be closely controlled from an authorization perspective relatively easily since most hardware dependencies will be visible only in the kernel and the device drivers. Physical and administrative security mechanisms are the first lines of defense used to achieve security objectives.

  • TRANSPORT AND APPLICATION SECURITY DESIGN AND USE

    This chapter considers security mechanisms/tools within protocols and application frameworks. The fundamentals of the available security protocols deployable within the transport layer are transport layer security protocol (TLSv1.2) used over transmission control protocol (TCP), secure sockets Layer protocol (SSLv3) used over TCP, secure shell protocol (SSH) used over TCP, and datagram transport layer security protocol (DTLSvl) used over user datagram protocol (UDP). Service application protocols are used to provide communication between application client programs, frequently called user agents (UAs), and application servers. These protocols include the following: electronic mail (email), World Wide Web (web) and Identity Management (IdM), voice over internet protocol (VoIP), and instant messaging (IM). The protocols also include peer-to-peer networks and applications, Java for distributed applications, .NET for distributed applications, CORBA for distributed applications and DCE for distributed applications.

  • Glossary

    No abstract.

  • FOUNDATION CONCEPTS

    This chapter considers the basic security services, first presented in ISO 7498-2 (ITU-T X.800), and their communications orientation, along with an alternative perspective of basic security services. It reviews the basic cryptographic concepts of algorithm types for secret information (keys), the types of keys (secret vs. public vs. private), attacks against cryptographic mechanisms (cryptanalysis), and important issues within key management. Hash algorithms play an important role in information security as the output (digest) produced by a hash algorithm is a key component for achieving both peer-entity and data-origin authentication security services along with the data integrity security service. Encryption (reversible) algorithms fall into two groups depending on how many keys are used, namely symmetric and asymmetric. The Diffie-Hellman secret key negotiation mechanism allows two subjects to agree on a shared secret key whenever one is needed provided the negotiation is protected from a man-in-the-middle (MITM) attack.

  • WHAT IS SECURITY?

    The central role of computer security for the working of the economy, the defense of the country, and the protection of the individual privacy is universally acknowledged today. Secure information systems must work reliably despite random errors, disturbances, and malicious attacks. This chapter examines a number of general ways of discussing security, including the common body of knowledge (CBK), by-function, and then systems engineering approaches. CBK is the critical body of knowledge that serves as a framework of security concepts, definitions, and principles that foster understanding of best practices among those engaged in activities related to information assurance/security. Confidentiality, integrity, and availability (CIA) are the core tenets of information security and are widespread over all the domains of the CBK. The chapter considers the many general security concepts and complexities associated with issues of safety, and information availability, and enterprise infrastructures. It also discusses some basic perspectives on information security.



Standards related to Information Assurance

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


Systems and software engineering -- Software life cycle processes

This International Standard establishes a common framework for software life cycle processes, with welldefined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that are to be applied during the acquisition of a software product or service and during the supply, development, operation, maintenance and disposal of software products. Software includes the software portion ...