Subject: | [AISWorld] CFP:7th Annual Symposium on Information Assurance (ASIA ’12) & 5th Secure Knowledge Management (SKM 2012) |
---|---|
Date: | Mon, 13 Feb 2012 15:41:06 -0500 |
From: | Manish Gupta <mgupta3@buffalo.edu> |
To: | aisworld@lists.aisnet.org <aisworld@lists.aisnet.org> |
CALL FOR PAPERS |
7th Annual Symposium on Information Assurance (ASIA 12) & 5th Secure Knowledge Management (SKM 2012) 15th Annual New York State Cyber Security Conference http://www.albany.edu/iasymposium |
SUBMISSION DEADLINE: March 05, 2012 Held on June 5-6, 2012 at Empire State Plaza in Albany, NY |
This is a call for papers for the 7th Annual Symposium on Information Assurance (ASIA 12), which is being merged with the 5th Secure Knowledge Management Conference (SKM 2012) this year. This event will be held in conjunction with the 15th Annual New York State Cyber Security Conference (NYSCSC). This two-day event is expected to attract over 900 participants including practitioners, researchers, and vendors providing opportunities for business and intellectual engagement among attendees. The symposium is organized by the School of Business and the NYS Center for Information Forensics and Assurance (CIFA) at the University at Albany, State University of New York, as well as the NYS Division of Homeland Security and Emergency Services Office of Cyber Security (OCS). Through generous sponsorships, we are able to have free registration for all selected presenters, authors of accepted papers, and members of government organizations. There is a modest fee of $50 for not-for-profit attendees and $200 for private registrants. All participants in ASIA & SKM will also be able to attend other NYSCSC sessions that typically cover practical applications of information security. Authors are invited to submit papers in information assurance and secure knowledge management for (but not limited to) topics listed below:
· Information Assurance
· Privacy &
· Information Security Education
· Risk Management
· Policy Design & Implementation
· Policy Compliance & Auditing
· Business Continuity
· Disaster Recovery
· Information Security Economics
· Cyber Warfare & Terrorism
· Internet-based Espionage
· Critical Infrastructure Security
· Smart Grid Security
· Network Data Collection & Analysis
· Intrusion Detection & Prevention
· Network Security
· Web Security
· Mobile Device Security
· Cloud Computing Security
· Cyber Crime Investigation
· Digital & Network Forensics
· Forensic Accounting & Fraud
· Self-Organization Based Models
· Cryptography / Quantum Computing
· Digital Rights Management
· Linguistic Analysis for Security
· Knowledge Management
· Content Management
· Security Languages
SUBMISSION GUIDELINES
1. Submitted papers must not have been previously published, or currently under consideration for publication elsewhere, or have substantial overlap with papers the author has submitted elsewhere.
2. Submissions undergo a double-blind peer review process.
3. Papers selected for presentation will be published in proceedings; however, we do not take the copyright away from authors. Arrangements are also being made with journals to publish extended versions of selected papers from the symposium.
4. Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the symposium chair if you have questions regarding your submission.
5. Papers should be submitted via the conference submission system at: https://www.easychair.org/conferences/?conf=asiaandskm2012
6. The paper should conform to the IEEE format and must include the following:
a) Separate title page (in plain text) with Title, Name(s) of authors, Organizational affiliation(s), telephone and fax number(s), postal address(es), and email address(es), Author to contact for correspondence about the paper.
b) Abstract (less than 250 words)
c) Paper including a brief biography of each author as appropriate at the end of the paper
SUBMISSION CATEGORIES
Submissions can be made in a number of categories: Completed research papers, research-in-progress papers, case studies, and panel proposals/round table discussions. Please follow the following guidelines in preparing your submission.
1. Completed Research Papers: Typically 5,000 words long (excluding abstract and references).
2. Research in Progress Papers: Typically 2,500 words (excluding abstract and references).
3. Panel
Proposals: Typically a 1,000 word description, identifying the
panelists to be
involve
IMPORTANT DATES
Submission Deadline 03/05/12 |
Reviewer Feedback 03/31/12 |
Final Paper Submission 04/15/12 |
Symposium Dates 06/05/12 06/06/12 |
ORGANIZING COMMITTEE ASIA 12 & SKM 2012
GENERAL CHAIR
Sanjay Goel
Director of Research, CIFA
Associate Professor, School of Business
University at Albany, SUNY
CONFERENCE CHAIR
Elisa Bertino
Professor, Computer Science Department
Research Director, CERIAS
Interim Director, Cyber Center (Discovery Park)
Purdue University, West Lafayette, IN
PROGRAM CHAIR
Raj Sharman
Associate Professor, School of Management
University at Buffalo, SUNY
ORGANIZATION CHAIR
Karen Sorady
Assistant Deputy Director of Cyber Programs, OCS
SUBMISSIONS CHAIR
Damira Pon
Senior Research Analyst, CIFA
University at Albany, SUNY
REVIEW CO-CHAIRS
Ravi Sen
Associate Professor
Dept. of Information and Operations Mgt.
Mays Business School
Texas A&M University
Chandrasekar Subramaniam
Associate Professor
Management
Information
Systems
University of North Carolina at Charlotte
csubrama@uncc.edu
ADVISORY COMMITTEE
Kevin A Kwiat, Air Force Research Lab
Nasir Memon, NYU Polytechnic
Hoang Pham, Rutgers University
H. Raghav Rao, University at Buffalo, SUNY
Bhavani Thuraisingham, UT Dallas
Shambhu Upadhyaya, Univ. at Buffalo, SUNY
PROGRAM COMMITTEE
Alex Tuzhilin, New York University
Alvaro Ortigosa, Autonoma Universidad de Madrid
Anil B. Somayaji, Carleton University, Canada
Ben Shao, Arizona State University
Billy Rios, Microsoft Corporation
Boleslaw Szymanski, RPI
Bradley Malin, Vanderbilt University
Daniel Rice, Tech. Solutions Experts, Inc.
Dipankar Dasgupta, University of Memphis
Farookh Salam, UNC at Greensboro
George Berg, University at Albany, SUNY
Gurpreet Dhillon, VCU
Hemantha Herath, Brock University
Hoang Pham, Rutgers University
Hong C. Li, Intel Corporation
Hui Xiong, Rutgers University
Jaideep Vaidya, Rutgers University
Jeffrey Carr, GreyLogic
Jim Cao, Alcatel-Lucent, Bell Laboratories
Jingguo Wang, UT at Arlington
Junjie Wu, Beihang University
M.P. Gupta, Indian Institute of Tech., Delhi
Manish Gupta, M&T Bank
Manish Parashar, Rutgers University
Marco Gruteser, Rutgers University
Martin Loeb, University of Maryland
Mohan Kankanhalli, National U. of Singapore
Murtuza Jadliwala, EPFL, Lausanne
Myon-K. Jeong, Rutgers University
Nan Zhang, George Washington University
Raghu Santanam, Arizona State University
Ronald Dodge, United States Military Academy
S. S. Ravi, University at Albany, SUNY
Shiu-Kai Chin, Syracuse University
Stelios Sidiroglou-Douskos, MIT
Stephen F. Bush, GE Global Research Center
Sumita Mishra, RIT
Tejaswani Herath, Brock University
Thu D. Nguyen, Rutgers University
Tin Kam Ho, Alcatel-Lucent Bell Laboratories
Tyrone Grandison, IBM Almaden Research Lab
Vidyaraman Sankaranarayanan, Microsoft
Vijay Atluri, Rutgers University
W. Art Chaovalitwongse, Univ. of Washington
Wade Trappe, Rutgers University
Yan Sun, University of Rhode Island
Yanyong Zhang, Rutgers University
Yucel Saygin, Sabanci University
Rahul Singh, United Nations Global Compact
Olivia Sheng, University of Utah
Manish Gupta, M&T Bank
Ernst Bekkering, Northeastern State University
Merrill Warkentin, Mississippi State University
Gaurav Bansal, University of Wisconsin