AOH :: IS1990.HTM

ICITST-2009: Second Call for Papers and Workshop Proposals.




ICITST-2009: Second Call for Papers and Workshop Proposals.
ICITST-2009: Second Call for Papers and Workshop Proposals.



  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--1457021584-119535239-1240208169=:32566
Content-Type: TEXT/PLAIN; CHARSET=UTF-8
Content-Transfer-Encoding: QUOTED-PRINTABLE
Content-ID:  

Forwarded from: d.lin (at) icitst.org

Apologies for cross-postings.

SECOND CALL FOR PAPERS AND WORKSHOP PROPOSALS

The 4th International Conference for Internet Technology and Secured 
Transactions (ICITST-2009), Technical Co-Sponsored by IEEE UK/RI 
Section, November 9=E2=80=9312, 2009, London, UK (www.icitst.org) 

The 4th International Conference for Internet Technology and Secured 
Transactions (ICITST-2009) is co-sponsored by IEEE UK/RI Section. The 
ICITST is an international refereed conference dedicated to the 
advancement of the theory and practical implementation of secured 
Internet transactions and to fostering discussions on information 
technology evolution. The ICITST aims to provide a highly professional 
and comparative academic research forum that promotes collaborative 
excellence between academia and industry. The objectives of the ICITST 
are to bridge the knowledge gap between academia and industry, promote 
research esteem in secured Internet transactions and the importance of 
information technology evolution to secured transactions. The 
ICITST-2009 invites research papers that encompass conceptual analysis, 
design implementation and performance evaluation. All the accepted 
papers will appear in the proceedings published by IEEE and fully 
indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.

The topics in ICITST-2009 include but are not confined to the following 
areas:

*  Application of agents
*  Application security
*  Blended Internet security methods
*  Biometrics
*  Boundary issues of Internet security
*  Broadband access technologies
*  Challenges of content authoring
*  Data mining security
*  E-society
*  Globalisation of information society
*  Government, and corporate Internet security policy
*  Internet architecture
*  Infonomics
*  IPSec quality of services
*  Patentability
*  Regulation, self-regulation, and co-regulation Web services
*  Secured database systems
*  Synchronising e-security
*  Software Architectures
*  Technology-enabled information
*  Trust, privacy, and data security
*  Wireless transactions
*  Context-Awareness and its Data mining for Ubi-com service
*  Human-Computer Interface and Interaction for Ubi-com
*  Smart Homes and its business model for Ubi-com service
*  Intelligent Multimedia Service and its Data management for Ubi-com
*  USN / RF-ID for Ubi-com service
*  Network security issues, protocols, data security in Ubi-com
*  Database protection for Ubi-com
*  Privacy Protection and Forensic in Ubi-com
*  Multimedia Security in Ubi-com
*  Quality of Service Issues
*  Authentication and Access control for data protection in Ubi-com
*  Information visualization
*  Web services
*  Service, Security and its Data management for U-commerce
*  New novel mechanism and Applications for Ubi-com
*  Information Management
*  Multimedia Information Systems
*  Information Retrieval
*  Natural Language Processing
*  Digital Libraries
*  Data and Information Quality Management
*  Data Grids, Data and Information Quality
*  Database Management
*  Web Databases
*  Temporal and Spatial Databases
*  Data Mining
*  Web Mining including Web Intelligence and Web 3.0
*  E-Learning, eCommerce, e-Business and e-Government
*  Web Metrics and its applications
*  XML and other extensible languages
*  Semantic Web and Ontology
*  Human-Computer Interaction
*  Artificial Intelligence and Expert Systems
*  Knowledge Management
*  Ubiquitous Systems
*  Peer to Peer Data Management
*  Interoperability
*  Mobile Data Management
*  Data Models for Production Systems and Services
*  Data Exchange issues and Supply Chain
*  Data Life Cycle in Products and Processes
*  Case Studies on Data Management, Monitoring and Analysis
*  Security and Access Control
*  Information Content Security
*  Software Architecture
*  System design and verification
*  Mobile, Ad Hoc and Sensor Network Security
*  Distributed information systems


IMPORTANT DATES

Extended Abstract Submission Date                       April 30, 2009
Paper Submission Date                                   May 31, 2009
Proposal for Workshops and Tutorials                    April 30, 2009
Notification of Workshop Acceptance                     May 15, 2009
Proposal for Industrial Presentation                    April 30, 2009
Notification of Extended Abstract Acceptance/Rejection  May 15, 2009
Notification of Industrial Presentation Acceptance      May 15, 2009
Notification of Paper Acceptance/Rejection              June 30, 2009
Camera Ready Paper Due                                  September 1, 2009
Author Registration                                     September 15, 2009
Early Bird Attendee registration                        October 01, 2009
Conference Dates                                        November 9-12, 2009


The ICITST also encourages organisations to submit their Job Fair Booth 
Reservations and/or Exhibit Proposals. If your organisation is 
interested, kindly submit a brief Proposal (not more than 1 side of A4 
page) to jobfair (at) icitst.org

For more details, visit www.icitst.org 


--1457021584-119535239-1240208169=:32566
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________      
Best Selling Security Books and More!
http://www.shopinfosecnews.org/ 

--1457021584-119535239-1240208169=:32566--

Site design & layout copyright © 1986-2014 CodeGods