Conferences related to Information Assurance

Back to Top

2020 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)

The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.


2019 IEEE 46th Photovoltaic Specialists Conference (PVSC)

Photovoltaic materials, devices, systems and related science and technology


2019 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2019 IEEE International Systems Conference (SysCon)

addresses the discipline of systems engineering,including theory, technology, methodology, andapplications of complex systems, system-of-systems,and integrated systems of national and globalsignificance.

  • 2018 Annual IEEE International Systems Conference (SysCon)

    The Conference addresses the discipline of systemsengineering, including theory, technology, methodology,and applications of complex systems, system-of-systems,and integrated systems of national and globalsignificance. It focuses on Systems Engineering for Complex Systems; and the conference caters to both practitioners andacademics, providing a forum to exchange ideas andexperiences on technology, methodology, applications,study cases, and practical experiences.

  • 2017 Annual IEEE International Systems Conference (SysCon)

    The IEEE International Systems Conference facilitates interactions among communities of interest on system-level problems andapplications. System-level thinking is essential in the worldtoday, not only for technical systems, but also for societyat large. The Conference addresses the discipline of systemsengineering, including theory, technology, methodology,and applications of complex systems, system-of-systems,and integrated systems of national and globalsignificance.

  • 2016 Annual IEEE Systems Conference (SysCon)

    The theme of the IEEE International SystemsConference is Engineering of Complex Systems, to includeSystems-of-systems, Systems Engineering, Systems Integration,and Systems Thinking

  • 2015 Annual IEEE Systems Conference (SysCon)

    The theme of the IEEE International Systems Conference is Engineering of Complex Systems, to include Systems-of-systems, Systems Engineering, Systems Integration, and Systems Thinking.

  • 2014 8th Annual IEEE Systems Conference (SysCon)

    This conference seeks to create an interactive forum forthe advancement of the practice of systems engineeringacross the multiple disciplines and specialty areasassociated with the engineering of complex systems. Theconference will provide a venue for systems engineeringpractitioners, managers, researchers, and educators toexchange innovative concepts, ideas, applications, andlessons learned addressing: Applications-oriented topics on large-scale systemsand system-of-systems in topics noted below

  • 2013 7th Annual IEEE Systems Conference (SysCon)

    Conference addresses systems, complex systems, systems-of-systems, critical systems, and the systems engineering disciplines needed to implement such large-scale or complex systems in the international arena.

  • 2012 6th Annual IEEE Systems Conference (SysCon)

    The IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-Systems Implications for Systems Engineering, Systems Integration, and Systems Thinking.

  • 2011 IEEE International Systems Conference (SysCon)

    IEEE International Systems Conference Scope is Engineering of Complex Systems, to include Systems-of-systems, Large-scale Systems Integration, and Systems Engineering and Systems Thinking.

  • 2010 4th Annual IEEE Systems Conference

    The theme of the IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-systems Implications for Systems Engineering, Systems Integration, and Systems Thinking.

  • 2009 3rd Annual IEEE Systems Conference

    Engineering Comles Integtared Systems and Systems-of-Systems - Implications for Systems Engineering, Systems Integration, and Systems Thinking

  • 2008 2nd Annual IEEE Systems Conference

    The theme of the IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-systems- Implications for Systems Engineering, Systems Integration, and Systems Thinking.

  • 2007 1st Annual IEEE Systems Conference

    The theme of the IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-systems - Implications for Systems Engineering, Systems Integration, and Systems Thinking.


2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC)

To provide a forum for free discussions of new ideas, research, development and applications in order to stimulate and inspire pioneering work in the field of digital avionics and related areas.To acquire high quality technical papers for publication in a DASC Proceedings and other appropriate publications such as the AIAA Journal of Aircraft and IEEE Systems Magazine.To provide a meeting that will further the progress of AIAA and IEEE entities, including Societies, Technical Committees and local Sections and thereby better serve the interests of all AIAA and IEEE members and the community at large.To provide an atmosphere that strengthens the interpersonal rapport of a large number of engineers and scientists interested in specialized and closely related fields.To provide an exhibition of current hardware and software products, methods and tools.To provide instruction in advances in digital avionics and to encourage and reward student academic participation.


More Conferences

Periodicals related to Information Assurance

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Education, IEEE Transactions on

Educational methods, technology, and programs; history of technology; impact of evolving research on education.


Electron Devices, IEEE Transactions on

Publishes original and significant contributions relating to the theory, design, performance and reliability of electron devices, including optoelectronics devices, nanoscale devices, solid-state devices, integrated electronic devices, energy sources, power devices, displays, sensors, electro-mechanical devices, quantum devices and electron tubes.


More Periodicals

Most published Xplore authors for Information Assurance

Back to Top

Xplore Articles related to Information Assurance

Back to Top

Panel Session - Learning Modules for Security, Privacy and Information Assurance In Undergraduate Engineering Education

[{u'author_order': 1, u'affiliation': u'Cal Poly Pomona', u'authorUrl': u'https://ieeexplore.ieee.org/author/37298698100', u'full_name': u'Daniel Manson', u'id': 37298698100}, {u'author_order': 2, u'affiliation': u'San Jos\xe9 State University, NSF STC TRUST', u'authorUrl': u'https://ieeexplore.ieee.org/author/37298698700', u'full_name': u'Sigurd Meldal', u'id': 37298698700}, {u'author_order': 3, u'affiliation': u'Carnegie Mellon University, Software Engineering Institute, CERT', u'authorUrl': u'https://ieeexplore.ieee.org/author/37298701900', u'full_name': u'Carol Sledge', u'id': 37298701900}, {u'author_order': 4, u'affiliation': u'UC Berkeley, Goldman School of Public Policy', u'authorUrl': u'https://ieeexplore.ieee.org/author/37298700200', u'full_name': u'Stephen M. Maurer', u'id': 37298700200}, {u'author_order': 5, u'affiliation': u'Stanford Computer Security Lab, Stanford University, NSF STC TRUST', u'authorUrl': u'https://ieeexplore.ieee.org/author/37275032900', u'full_name': u'John C. Mitchell', u'id': 37275032900}, {u'author_order': 6, u'affiliation': u'Center for Systems Security and Information Assurance', u'authorUrl': u'https://ieeexplore.ieee.org/author/37298702900', u'full_name': u'Erich Spengler', u'id': 37298702900}, {u'author_order': 7, u'affiliation': u'The Institute for Software Integrated Systems, Vanderbilt University, NSF STC TRUST', u'authorUrl': u'https://ieeexplore.ieee.org/author/37272402300', u'full_name': u'Janos Sztipanovits', u'id': 37272402300}, {u'author_order': 8, u'affiliation': u'CSU San Bernardino', u'authorUrl': u'https://ieeexplore.ieee.org/author/37298702100', u'full_name': u'Javier Torner', u'id': 37298702100}] Proceedings. Frontiers in Education. 36th Annual Conference, 2006

Computer trustworthiness continues to increase in importance as a pressing scientific, economic, and social problem. In today's environment, there is heightened awareness of the threat of well-funded professional cyber hackers and the potential for nation-state sponsored cyber warfare. An accelerating trend of the last decade has been the growing integration role of computing and communication in critical infrastructure systems that ...


Novel technique for steganography in fingerprints images: Design and implementation

[{u'author_order': 1, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'authorUrl': u'https://ieeexplore.ieee.org/author/37431785000', u'full_name': u'Hanan Mahmoud', u'id': 37431785000}, {u'author_order': 2, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'authorUrl': u'https://ieeexplore.ieee.org/author/38275521500', u'full_name': u'Hanan Saad Al-Hulaibah', u'id': 38275521500}, {u'author_order': 3, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'authorUrl': u'https://ieeexplore.ieee.org/author/38270118600', u'full_name': u'Sarah Ahmad Al-Naeem', u'id': 38270118600}, {u'author_order': 4, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'authorUrl': u'https://ieeexplore.ieee.org/author/38276727900', u'full_name': u'Suha Ali Al-Qhatani', u'id': 38276727900}, {u'author_order': 5, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'authorUrl': u'https://ieeexplore.ieee.org/author/38272076500', u'full_name': u'Aljoharah Al-Dawood', u'id': 38272076500}, {u'author_order': 6, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'authorUrl': u'https://ieeexplore.ieee.org/author/38276859800', u'full_name': u'Buthaina Saleh Al-Nassar', u'id': 38276859800}, {u'author_order': 7, u'affiliation': u'Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia', u'authorUrl': u'https://ieeexplore.ieee.org/author/38277320000', u'full_name': u'Dhay Yousef AL-Salman', u'id': 38277320000}] 2010 Sixth International Conference on Information Assurance and Security, 2010

This paper describes the design and implementation of a project concerning the hiding of messages in images specifically fingerprint images. Fingerprints differentiate one person from another, and one finger from another. Every human being has twenty different fingerprints, and they do not have any similarity throughout the history of mankind. The policy of this project is to keep the confidential ...


Increasing minority participation in information assurance

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. & Inf. Sci., Florida Agric. & Mech. Univ., Tallahassee, FL, USA', u'authorUrl': u'https://ieeexplore.ieee.org/author/37557122000', u'full_name': u'D.W. Evans', u'id': 37557122000}, {u'author_order': 2, u'affiliation': u'Dept. of Comput. & Inf. Sci., Florida Agric. & Mech. Univ., Tallahassee, FL, USA', u'authorUrl': u'https://ieeexplore.ieee.org/author/37563121100', u'full_name': u'C.L. Chatmon', u'id': 37563121100}] 2005 6th International Conference on Information Technology Based Higher Education and Training, 2005

In fall semester 2005, the Computer & Information Sciences Department at Florida Agricultural & Mechanical University, a historical black college and university, introduced an information assurance certificate track. The introduction of new courses into any curriculum presents the traditional problems. This paper provides an overview of our experience in establishing an undergraduate information assurance certificate program. Specifically, details are given ...


State observer based adaptive information assurance evaluation model

[{u'author_order': 1, u'affiliation': u'School of Management, Tianjin University, 300072, China', u'full_name': u'Lan Ma'}, {u'author_order': 2, u'affiliation': u'School of Electronics & Information Engineering, Civil Aviation University of China, 300300, China', u'full_name': u'Gang Li'}, {u'author_order': 3, u'affiliation': u'School of Electronics & Information Engineering, Civil Aviation University of China, 300300, China', u'full_name': u'Wei Gao'}] 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010

Information Assurance (IA) is drawing considerable attention of researchers in protecting key intelligent system and state network infrastructure from attacks and intrusion. IA is a complex system engineering, the operation of IA is a dynamic adjust processing. This paper applied the system control theory in the IA to set up a multi-input and multi-output control system with output feedback. In ...


Visualizing an information assurance risk taxonomy

[{u'author_order': 1, u'affiliation': u'University of British Columbia, USA', u'authorUrl': u'https://ieeexplore.ieee.org/author/38279266800', u'full_name': u'Victoria Lemieux', u'id': 38279266800}, {u'author_order': 2, u'affiliation': u'University of Washington, USA', u'authorUrl': u'https://ieeexplore.ieee.org/author/38276808600', u'full_name': u'Barbara Endicott-Popovsky', u'id': 38276808600}, {u'author_order': 3, u'affiliation': u'University of Washington, USA', u'authorUrl': u'https://ieeexplore.ieee.org/author/38293285300', u'full_name': u'Karl Eckler', u'id': 38293285300}, {u'author_order': 4, u'affiliation': u'University of British Columbia, USA', u'authorUrl': u'https://ieeexplore.ieee.org/author/38305609100', u'full_name': u'Thomas Dang', u'id': 38305609100}, {u'author_order': 5, u'affiliation': u'University of British Columbia, USA', u'authorUrl': u'https://ieeexplore.ieee.org/author/37990064400', u'full_name': u'Adam Jansen', u'id': 37990064400}] 2011 IEEE Conference on Visual Analytics Science and Technology (VAST), 2011

The researchers explore the intersections between Information Assurance and Risk using visual analysis of text mining operations. The methodological approach involves searching for and extracting for analysis those abstracts and keywords groupings that relate to risk within a defined subset of scientific research journals. This analysis is conducted through a triangulated study incorporating visualizations produced using both Starlight and In-Spire ...


More Xplore Articles

Educational Resources on Information Assurance

Back to Top

eLearning

No eLearning Articles are currently tagged "Information Assurance"

IEEE-USA E-Books

  • About the Author

    No abstract.

  • Traditional Network Concepts

    This chapter contains sections titled: * Networking Architectures * Types of Networks * Network Protocols * Chapter Summary * Further Reading and Resources * Questions * Exercises ]]>

  • SECURITY SYSTEMS ENGINEERING

    This chapter considers how information governance and systems engineering can be applied to achieve information assurance. It looks at vulnerabilities threat agents, attack vectors, and their corresponding impact on risk. A basic component of engineering is the functional or performance-specific detailed requirement. Requirements have to be based on decomposition of policy statements. The security policy provides the foundation for how the organization makes a due diligence effort toward securing assets. Senior management oversight is fundamental to achieving consistent and compliant adherence to the security policy. Involvement of management will facilitate security policy compliance. Employee involvement is necessary to meeting policy mandates. A primary purpose of security management is to ensure that the organization achieves its security goals and objectives, while avoiding unnecessary risks to itself and those it serves. The chapter describes access control and access control structures and looks at simple mathematical structures and their use in access control.

  • Security Systems Engineering

    This chapter contains sections titled: * Security Policy Development * Senior Management Oversight and Involvement * Security Process Management and Standards * Information Security Systems Engineering Methodology * Requirements Analysis and Decomposition * Access Control Concepts * Security Modeling and Security-Related Standards * Chapter Summary * Questions * Exercises ]]>

  • Next-Generation Networks

    This chapter contains sections titled: * Framework and Topology of the NGN * The NGN Functional Reference Model * Relationship between NGN Transport and Service Domains * Enterprise Role Model * Security Allocation within the NGN Transport Stratum Example * Converged Network Management (TMN and eTOM) * General Network Security Architectures * Chapter Summary * Further Reading and Resources * Exercises ]]>

  • Transport and Application Security Design and Use

    This chapter contains sections titled: * Layer 4��-��Transport Security Protocols * Layer 5��-��User Service Application Protocols * Chapter Summary * Further Reading and Resources * Questions * Exercises ]]>

  • About The Author

    No abstract.

  • SECURING MANAGEMENT AND MANAGING SECURITY

    This chapter provides an overview of modern network and infrastructure management as a context to the management of deployed security mechanisms. It discusses the need for management to stay involved in security management activities. This is followed by a discussion of operational security, necessary mechanisms, including forensics, third-party access reviews, and certification. The chapter then examines security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. It also considers the need for compliance relative to security policies that must be adhered to by operations and management personnel. An operational security compliance program exists to ensure that all those business requirements, policy statements, and specific security dictates are being complied with. The chapter concludes with consideration of activities related to security when developing or purchasing functions, subsystems, or complete solutions.

  • WHAT IS SECURITY?

    The central role of computer security for the working of the economy, the defense of the country, and the protection of the individual privacy is universally acknowledged today. Secure information systems must work reliably despite random errors, disturbances, and malicious attacks. This chapter examines a number of general ways of discussing security, including the common body of knowledge (CBK), by-function, and then systems engineering approaches. CBK is the critical body of knowledge that serves as a framework of security concepts, definitions, and principles that foster understanding of best practices among those engaged in activities related to information assurance/security. Confidentiality, integrity, and availability (CIA) are the core tenets of information security and are widespread over all the domains of the CBK. The chapter considers the many general security concepts and complexities associated with issues of safety, and information availability, and enterprise infrastructures. It also discusses some basic perspectives on information security.

  • Authentication of Subjects

    This chapter contains sections titled: * Authentication Systems * Human Authentication * Chapter Summary * Further Reading and Resources * Questions * Exercises ]]>



Standards related to Information Assurance

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


Systems and software engineering -- Software life cycle processes

This International Standard establishes a common framework for software life cycle processes, with welldefined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that are to be applied during the acquisition of a software product or service and during the supply, development, operation, maintenance and disposal of software products. Software includes the software portion ...



Jobs related to Information Assurance

Back to Top