(DBWORLD) CFP -- IFIP WG 11.5 Working Conference

Sushil Jajodia (jajodia@isse.gmu.edu)
Tue, 7 Oct 1997 13:25:51 -0400 (EDT)

---------------------------------------------------------------------------

CALL FOR PAPERS

---------------------------------------------------------------------------

SECOND ANNUAL IFIP WG 11.5 WORKING CONFERENCE ON
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS:
BRIDGING BUSINESS REQUIREMENTS AND RESEARCH RESULTS

Sponsor:

* IFIP TC-11 Working Group 11.5

Cosponsors:

* IFAC IT-Committee
* Applied Computer Security Associates
* Center for Secure Information Systems,
George Mason University

Airlie Center, Warrenton, Virginia, USA

November 19--20, 1998

Although it is well-known that confidentiality, integrity and
availability are high-level objectives of IT security, much of the
attention in the security arena has been devoted to the
confidentiality aspect of security. IFIP TC-11 Working Group 11.5 has
been charged with exploring the area of the integrity objective within
IT security and the relationship between integrity in information
systems and the overall internal control systems that are established
in organizations to support the corporate governance codes.

This working conference seeks to establish the basis for an ongoing
dialog between the IT security specialists and the internal control
specialists so that both may work more effectively together to assist
in creating effective business systems in the future. The goals for
this conference are to find an answer to the following questions:

o what precisely do business managers need to have
confidence in the integrity of their information systems and
their data

o what is the status quo of research and development in this area

o where are the gaps between business needs on the one hand and
research and development on the other and what needs to
be done to bridge these gaps

TOPICS:

We solicit papers describing original ideas and results on foundations
and applications related to the subject of integrity and internal
control in information systems. Suggested topics include but are not
limited to:

o integrity maintenance in databases and distributed databases
o integrity maintenance in legacy and nontraditional systems
o active mechanisms for integrity maintenance
o static and dynamic integrity constraints
o methods for dealing with incomplete or inconsistent information
o autonomy versus global integrity in multi-database systems
o efficient methods for checking integrity
o users and organizational requirements with respect to integrity
o integrity requirements necessary to implement an internal control
structure within an organization
o system and data integrity maintenance during recovery processes
o integrity of archival data
o methods for implementing data retention policies
o methods to repair integrity of data warehouses
o methods to integrate managerial judgement on the action to take in
relation to identified data errors
o integrity of data dictionaries
o programmable integrity measures in application systems

INSTRUCTIONS FOR AUTHORS:

Authors are invited to submit six copies of papers before April 1,
1998. The text must be submitted in English. Papers should be limited
to 5000 words, full page figures being counted as 300 words. Each
paper must include a short abstract and a list of keywords indicating
subject classification. The full names and addresses of the authors
should be printed only on the title page (no names in the rest of the
paper). The author who is the contact person should be identified as
such. Acceptance of a paper means an obligation for at least one of
the authors to attend the working conference and present the paper.

IT security and the relationship between integrity in information
systems and the overall internal control systems that are established
in organisations to support the corporate governance codes.

This working conference seeks to establish the basis for an ongoing dialog
between the IT security specialists and the internal control
specialists so that both may work more effectively together to assist
in creating effective business systems in the future. The goals for
this conference are to find an answer to the following questions:

* what precisely do business managers need in order to have
confidence in the integrity of their information systems and
their data;
* what is the status quo of research and development in this area;
* where are the gaps between business needs on the one hand and research
and development on the other and what needs to be done to bridge these
gaps.

To achieve these goals, papers and panel proposals are solicited from
both areas: practical experiences and business needs as well as
original research results and developments. This call for papers
therefore addresses specifically all arenas that have an interest in
trustworthy information systems: business managers, accountants and
auditors, security specialists, researchers and system
developers. Innovative ideas are hoped for and expected.

Submissions will be refereed by members of the Programme Committee and
members of the Working Group. Papers will be selected based on the
technical merit and their relevance to the goals of the working
conference and the aim and scope of WG 11.5 (Integrity and Internal
Control). For the avoidance of any doubt, the working group considers
integrity to cover the integrity of the system, of the data stored
and/or transmitted and of the information supplied by the system to
people to perform necessary business tasks.

TOPICS

We solicit papers describing original ideas and results on foundations and
applications related to the subject of integrity and internal control in
information systems. Suggested topics include but are not limited to:

o integrity maintenance in databases and distributed databases
o integrity maintenance in legacy systems and in non-traditional systems
o active mechanisms for integrity maintenance
o static and dynamic integrity constraints
o methods for dealing with incomplete or inconsistent information
o autonomy versus global integrity in multi-database systems
o efficient methods for checking integrity
o users and organizational requirements with respect to integrity
o integrity requirements necessary to implement an internal control
structure within an organization
o system and data integrity maintenance during recovery processes
o integrity of archival data
o methods for implementing data retention policies
o methods to repair integrity of data warehouses
o methods to integrate managerial judgement on the action to take in
relation to identified data errors
o integrity of data dictionaries

INSTRUCTIONS FOR AUTHORS:

Authors are invited to submit six copies of papers before April 1,
1998. The text must be submitted in English. Papers should be limited
to 5000 words, full page figures being counted as 300 words. Each
paper must include a short abstract and a list of keywords indicating
subject classification. The full names and addresses of the authors
should only be printed only on the first title page (no names in the
rest of the paper). The author who is the contact person should be
identified as such. Acceptance of a paper means an obligation for at
least one of the authors to attend the working conference and present
the paper. Papers must be sent to:

Professor Sushil Jajodia
Sci & Tech II, Room 430
George Mason University
Fairfax VA 22030-4444, USA
telephone: +1 703 993 1653
fax: +1 703 993 1638
E-mail: jajodia@isse.gmu.edu
http://www.isse.gmu.edu/~csis/faculty/jajodia.html

Selection will be based on originality and contribution to the
field. The proceedings will be published by Chapman & Hall and will be
available at the working conference.

IMPORTANT DATES:

Deadline for submission: April 1, 1998
Notification of Acceptance: June 15, 1998
Final camera-ready copy due: August 1, 1998

ORGANIZING COMMITTEE:

General Chair: Dr. Marshall Abrams
The MITRE Corporation, W-422
1820 Dolley Madison Blvd,
Mc Lean, VA 22101-3481
telephone 703-883-6938
secretary 703-883-7794
facsimile 703-883-1397
email: abrams@mitre.org

Local Arrangements: Prof Dr. Edgar Sibley
Mail Stop 4A4
George Mason University
Fairfax, VA 22030-4444

Phone: 703-993-1640
Fax: 703-993-1638
email: esibley@gmu.edu
http://www.isse.gmu.edu/

IFIP WG 11,5 Chair and
Proceedings Chair:

Mr. Leon Strous, chairman of IFIP TC-11 Working Group 11.5
Gistel 20, 5707 GV Helmond, The Netherlands
telephone: +31 20 5242748 (business) / +31 492 548636 (private)
fax: +31 492 548636
E-mail: strous@iaehv.nl

PROGRAMME COMMITTEE:

Chairman:

Prof. Dr. Sushil Jajodia, George Mason University, USA

Co-chairs:

Mr. William List CA, The Kingswell Partnership, UK
Mr. Graeme McGregor CA, The Broken Hill Proprietary Company, Australia

MORE INFORMATION:

Additional and updated information about the conference
can be found on the World Wide Web at URL:
http://www.ifip.tu-graz.ac.at/TC11/CONF/CFPINS.html

--------------------------------------------------------------------------
The dbworld list reaches many people, and should only be used for
messages of general interest to the database community.
To subscribe or unsubscribe yourself (or optionally (address)) from
dbworld, send a msg to majordomo@cs.wisc.edu with one of these lines:
subscribe dbworld (address)
unsubscribe dbworld (address)
To find out more options send a msg with the line:
help
--------------------------------------------------------------------------