2,168 resources related to Information Assurance
- Topics related to Information Assurance
- IEEE Organizations related to Information Assurance
- Conferences related to Information Assurance
- Periodicals related to Information Assurance
- Most published Xplore authors for Information Assurance
The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.
To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.
With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI
The conference program will consist of plenary lectures, symposia, workshops andinvitedsessions of the latest significant findings and developments in all the major fields ofbiomedical engineering.Submitted papers will be peer reviewed. Accepted high quality paperswill be presented in oral and postersessions, will appear in the Conference Proceedings and willbe indexed in PubMed/MEDLINE & IEEE Xplore
Computer in Technical Systems, Intelligent Systems, Distributed Computing and VisualizationSystems, Communication Systems, Information Systems Security, Digital Economy, Computersin Education, Microelectronics, Electronic Technology, Education
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes
The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...
Educational methods, technology, and programs; history of technology; impact of evolving research on education.
Publishes original and significant contributions relating to the theory, design, performance and reliability of electron devices, including optoelectronics devices, nanoscale devices, solid-state devices, integrated electronic devices, energy sources, power devices, displays, sensors, electro-mechanical devices, quantum devices and electron tubes.
Proceedings. Frontiers in Education. 36th Annual Conference, 2006
Computer trustworthiness continues to increase in importance as a pressing scientific, economic, and social problem. In today's environment, there is heightened awareness of the threat of well-funded professional cyber hackers and the potential for nation-state sponsored cyber warfare. An accelerating trend of the last decade has been the growing integration role of computing and communication in critical infrastructure systems that ...
2010 Sixth International Conference on Information Assurance and Security, 2010
This paper describes the design and implementation of a project concerning the hiding of messages in images specifically fingerprint images. Fingerprints differentiate one person from another, and one finger from another. Every human being has twenty different fingerprints, and they do not have any similarity throughout the history of mankind. The policy of this project is to keep the confidential ...
2005 6th International Conference on Information Technology Based Higher Education and Training, 2005
In fall semester 2005, the Computer & Information Sciences Department at Florida Agricultural & Mechanical University, a historical black college and university, introduced an information assurance certificate track. The introduction of new courses into any curriculum presents the traditional problems. This paper provides an overview of our experience in establishing an undergraduate information assurance certificate program. Specifically, details are given ...
2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010
Information Assurance (IA) is drawing considerable attention of researchers in protecting key intelligent system and state network infrastructure from attacks and intrusion. IA is a complex system engineering, the operation of IA is a dynamic adjust processing. This paper applied the system control theory in the IA to set up a multi-input and multi-output control system with output feedback. In ...
2011 IEEE Conference on Visual Analytics Science and Technology (VAST), 2011
The researchers explore the intersections between Information Assurance and Risk using visual analysis of text mining operations. The methodological approach involves searching for and extracting for analysis those abstracts and keywords groupings that relate to risk within a defined subset of scientific research journals. This analysis is conducted through a triangulated study incorporating visualizations produced using both Starlight and In-Spire ...
Developing Automated Analysis Tools for Space/Time Sidechannel Detection - IEEE SecDev 2016
Humility and Leadership: Can they go hand in hand? - Roshan Roeder at IEEE WIE Forum USA East 2017
The Moral Importance of Cybersecurity | IEEE TechEthics Virtual Panel
BSIM Spice Model Enables FinFET and UTB IC Design
Self-Organization with Information Theoretic Learning
Information Technology: Careers for the information age
IEEE Future Directions: Green Information and Communications Technology: An Overview
Special Evening Panel Discussion: AI, Cognitive Information Processing, and Rebooting Computing - IEEE Rebooting Computing 2017
Data Modeling using Kernels and Information Theoretic Learning
AuthorLab: Featuring the IEEE Author Posting Policy
IEEE Entrepreneurship Panel at HKN Student Leadership Conference 2018
EMBC 2011 -Keynote -The Impact of Information Technology on Health Care Delivery - John Glaser, PhD
Augmented Reality in Operating Rooms
CES 2008: Ford and Sirius Team Up for In-Car Navigation
Seven (Small) Steps to Protecting Big Trade Secrets and Confidential Information, Part 1 - IEEE USA
ICASSP 2012 Plenary-Dr. Chin-Hui Lee
The role of aggregation guided by fuzzy quantifiers in Information Retrieval and in Social Media Analytics
Seeing the Invisibles: A Backstage Tour of Information Forensics
8-Element, 1-3GHz Direct Space-to-Information Converter - Matthew Bajor - RFIC Showcase 2018
Computer trustworthiness continues to increase in importance as a pressing scientific, economic, and social problem. In today's environment, there is heightened awareness of the threat of well-funded professional cyber hackers and the potential for nation-state sponsored cyber warfare. An accelerating trend of the last decade has been the growing integration role of computing and communication in critical infrastructure systems that now have complex interdependencies rooted in information technologies. These overlapping and interacting trends force us to recognize that trustworthiness of our computer systems is not an IT issue any more; it has a direct and immediate impact on our critical infrastructure. Security is often a collective enterprise, with complicated interdependencies and composition issues among a variety of participants. This poses a challenge for traditional engineering education models and curricula. The panel will discuss experiences and strategies to establish curricular foundation elements providing CSET graduates with an understanding of the interaction between cyber security, critical infrastructure systems and public policy
This paper describes the design and implementation of a project concerning the hiding of messages in images specifically fingerprint images. Fingerprints differentiate one person from another, and one finger from another. Every human being has twenty different fingerprints, and they do not have any similarity throughout the history of mankind. The policy of this project is to keep the confidential messages hidden inside the drawing of the fingerprints. Due to the variations in shapes of the fingerprint that is carrying the hidden message, it would appear as if there is nothing inside the message. So, anyone who would try to concentrate and analyze the fingerprint, it will appear to him as if it belongs to a different person, and not the picture that has changed in looks and colors. This project will provide a system to serve both sender and receiver of the secret message. The sender will write the content of the message, and the system will hide it inside the new fingerprint, and then return it to the sender. So, that he could send it to the receiver in any way he deems necessary. When the receiver loads the fingerprint in the system, and asks for reading the message, the system would analyze the fingerprint, and display the content of the message to the receiver.
In fall semester 2005, the Computer & Information Sciences Department at Florida Agricultural & Mechanical University, a historical black college and university, introduced an information assurance certificate track. The introduction of new courses into any curriculum presents the traditional problems. This paper provides an overview of our experience in establishing an undergraduate information assurance certificate program. Specifically, details are given about the new information assurance courses and the different instructional methodologies used. Additionally, a summary of student feedback, lesson learned by faculty, and possible future directions are given.
Information Assurance (IA) is drawing considerable attention of researchers in protecting key intelligent system and state network infrastructure from attacks and intrusion. IA is a complex system engineering, the operation of IA is a dynamic adjust processing. This paper applied the system control theory in the IA to set up a multi-input and multi-output control system with output feedback. In the proposed model, the security of systems is quantified based on the security qualities of and interrelations between sub-systems. Simulation results show that this proposed model can meet the requirements of system security, and the model works well in the information assurance evaluation.
The researchers explore the intersections between Information Assurance and Risk using visual analysis of text mining operations. The methodological approach involves searching for and extracting for analysis those abstracts and keywords groupings that relate to risk within a defined subset of scientific research journals. This analysis is conducted through a triangulated study incorporating visualizations produced using both Starlight and In-Spire visual analysis software. The results are definitional, showing current attitudes within the Information Assurance research community towards risk management strategies, while simultaneously demonstrating the value of visual analysis processes when engaging in sense making of a large body of knowledge.
This paper presents a new inexpensive portable learning platform for information assurance and security (IAS) education. Unique features such as affordable settings, portability, and isolated network are discussed. This project is developed based on open sourced or free software to minimize the implementation cost. A dedicated repository that hosts our findings and deliverables is freely available online. This portable learning platform makes it possible to offer hands-on lab intensive curriculum online and to enhance research productivity on IAS.
For modern Automatic Test Equipment (ATE) one of the most daunting tasks is now Information Assurance (IA). What was once at most a secondary item consisting mainly of installing an Anti-Virus suite is now becoming one of the most important aspects of ATE. Given the current climate of IA it has become important to ensure ATE is kept safe from any breaches of security or loss of information. Even though most ATE are not on the Internet (or even on a network for many) they are still vulnerable to some of the same attack vectors plaguing common computers and other electronic devices. This paper will discuss some of the processes and procedures which must be used to ensure that modern ATE can continue to be used to test and detect faults in the systems they are designed to test. The common items that must be considered for ATE are as follows: The ATE system must have some form of Anti-Virus (as should all computers). The ATE system should have a minimum software footprint only providing the software needed to perform the task. The ATE system should be verified to have all the Operating System (OS) settings configured pursuant to the task it is intended to perform. The ATE OS settings should include password and password expiration settings to prevent access by anyone not expected to be on the system. The ATE system software should be written and constructed such that it in itself is not readily open to attack. The ATE system should be designed in a manner such that none of the instruments in the system can easily be attacked. The ATE system should insure any paths to the outside world (such as Ethernet or USB devices) are limited to only those required to perform the task it was designed for. These and many other common configuration concerns will be discussed in the paper.
Interactions between the five pillars of information assurance-availability, integrity, authentication, confidentiality, and nonrepudiation-can be problematic. Measures taken to further the goal of one pillar are often blind to the needs of another pillar. The author explores such interactions using graphical forms to better represent conflicts. For example, availability might introduce conflicts with confidentiality, integrity and authentication, but confidentiality and integrity are largely complementary. This article is part of a special issue on security.
Students in an academic environment regularly install malware such as viruses and spyware on their personal computers and then connect to institutional automation resources. Malware reduces personal productivity and places a strain on university automation resources such as network bandwidth, email servers and enterprise storage servers. Technical products to malware detection and removal provide only a partial solution. Student education on information awareness can provide another vector to help deter malware installation. To test the effect of the information assurance education already in place at the United States Military Academy, we designed, built and ran an information awareness exercise system across the entire student body. The exercise was designed to target those counter-productive behaviors most prevalent in the student body. This paper discusses how we implemented the system and the results of the exercise
In 2004, Dakota State University proposed a model for information assurance and computer security program development. That model provided a framework for developing undergraduate and graduate programs at DSU. This paper provides insight into experiences and lessons learned to further implement that model. The paper details modifications to both the undergraduate and graduate information assurance programs as a result of specific issues and challenges. Further, the paper highlights the introduction of a new terminal degree that includes an information assurance specialization. As a national center of excellence in information assurance education, we are confident that this paper will be helpful to universities around the world in either developing new or improving existing IA programs.
This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.
This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.
This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...
This International Standard establishes a common framework for software life cycle processes, with welldefined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that are to be applied during the acquisition of a software product or service and during the supply, development, operation, maintenance and disposal of software products. Software includes the software portion ...
IT Internal Auditor
IT Operations Engineer - Technical Executive CENTCOM
The National Security Agency