[ISN] CALL FOR PAPERS, WORKSHOPS AND SPECIAL TRACKS: The 4th International Conference for Internet Technology and Secured Transactions (ICITST-2009), Technical Co-Sponsored by IEEE UK/RI Section

From: InfoSec News <alerts_at_private>
Date: Thu, 19 Feb 2009 02:27:44 -0600 (CST)
Forwarded from: info (at) icitst.org

Subject: CALL FOR PAPERS: The 4th International Conference for Internet 
Technology and Secured Transactions (ICITST-2009), Technical 
Co-Sponsored by IEEE UK/RI Section

***************
CALL FOR PAPERS
***************

The 4th International Conference for Internet Technology and Secured 
Transactions (ICITST-2009), Technical Co-Sponsored by IEEE UK/RI 
Section, November 9–12, 2009, London, UK (www.icitst.org)

The 4th International Conference for Internet Technology and Secured 
Transactions (ICITST-2009) is co-sponsored by IEEE UK/RI Section. The 
ICITST is an international refereed conference dedicated to the 
advancement of the theory and practical implementation of secured 
Internet transactions and to fostering discussions on information
technology evolution. The ICITST aims to provide a highly professional 
and comparative academic research forumthat promotes collaborative 
excellence between academia and industry. The objectives of the ICITST 
are to bridge the knowledge gap between academia and industry, promote 
research esteem in secured Internet transactions and the importance of 
information technology evolution to secured transactions. The 
ICITST-2009 invites research papers that encompass conceptual analysis, 
design implementation and performance evaluation.
All the accepted papers will appear in the proceedings published by IEEE 
and fully indexed by IEEE Xplore.
All the ICITST papers are indexed by DBLP.

The topics in ICITST-2009 include but are not confined to the following 
areas:

*  Application of agents
*  Application security
*  Blended Internet security methods
*  Biometrics
*  Boundary issues of Internet security
*  Broadband access technologies
*  Challenges of content authoring
*  Data mining security
*  E-society
*  Globalisation of information society
*  Government, and corporate Internet security policy
*  Internet architecture
*  Infonomics
*  IPSec quality of services
*  Patentability
*  Regulation, self-regulation, and co-regulation Web services
*  Secured database systems
*  Synchronising e-security
*  Technology-enabled information
*  Trust, privacy, and data security
*  Wireless transactions
*  Context-Awareness and its Data mining for Ubi-com service
*  Human-Computer Interface and Interaction for Ubi-com
*  Smart Homes and its business model for Ubi-com service
*  Intelligent Multimedia Service and its Data management for Ubi-com
*  USN / RF-ID for Ubi-com service
*  Network security issues, protocols, data security in Ubi-com
*  Database protection for Ubi-com
*  Privacy Protection and Forensic in Ubi-com
*  Multimedia Security in Ubi-com
*  Quality of Service Issues
*  Authentication and Access control for data protection in Ubi-com
*  Information visualization
*  Web services
*  Service, Security and its Data management for U-commerce
*  New novel mechanism and Applications for Ubi-com
*  Information Management
*  Multimedia Information Systems
*  Information Retrieval
*  Natural Language Processing
*  Digital Libraries
*  Data and Information Quality Management
*  Data Grids, Data and Information Quality
*  Database Management
*  Web Databases
*  Temporal and Spatial Databases
*  Data Mining
*  Web Mining including Web Intelligence and Web 3.0
*  E-Learning, eCommerce, e-Business and e-Government
*  Web Metrics and its applications
*  XML and other extensible languages
*  Semantic Web and Ontology
*  Human-Computer Interaction
*  Artificial Intelligence and Expert Systems
*  Knowledge Management
*  Ubiquitous Systems
*  Peer to Peer Data Management
*  Interoperability
*  Mobile Data Management
*  Data Models for Production Systems and Services
*  Data Exchange issues and Supply Chain
*  Data Life Cycle in Products and Processes
*  Case Studies on Data Management, Monitoring and Analysis
*  Security and Access Control
*  Information Content Security
*  Mobile, Ad Hoc and Sensor Network Security
*  Distributed information systems


IMPORTANT DATES

Extended Abstract Submission Date                       April 30, 2009
Paper Submission Date                                   May 31, 2009
Proposal for Workshops and Tutorials                    April 30, 2009
Notification of Workshop Acceptance                     May 15, 2009
Proposal for Industrial Presentation                    April 30, 2009
Notification of Extended Abstract Acceptance/Rejection  May 15, 2009
Notification of Industrial Presentation Acceptance      May 15, 2009
Notification of Paper Acceptance/Rejection              June 30, 2009
Camera Ready Paper Due                                  September 1, 2009
Author Registration                                     September 15, 2009
Early Bird Attendee registration                        October 01, 2009
Conference Dates                                        November 9-12, 2009




PROGRAM COMMITTEES


Honorary Chair
Kevin Warwick, University of Reading, UK


General Chairs
Godfried Williams, University of East London, UK
Ion Tutanescu, University of Pitesti, Romania

General Vice-Chairs
Kevin J. Lü, Brunel University, UK
Shi-Cho Cha, National Taiwan University of Science and Technology, 
Taiwan, ROC

Technical Program Chair
Emmanuel Hooper, Harvard University, Harvard MIT Yale Scholar, USA
Bernd Markscheffel, Technische Universität Ilmenau, Germany

International Chairs
Nicu Bizon, University of Pitesti, Romania
Titus Olaniyi, London South Bank University, UK
Hiroshi Ishikawa, Shizuoka University, Japan

Poster and Demo Chair
Fred Mtenzi, Dublin Institute of Technology, Ireland

Local Arrangements Chairs
Alex Logvynovskiy, University of East London, UK
Cyril Azenabor, University of East London, UK

Post-Conference Tour Chair
Babatunde Ali-Alao, University of Greenwich, UK

Research Student Forum Chairs
Taiwo Ayodele, University of Portsmouth, UK
Terry Walcott, University of East London, UK

Publication Chairs
Charles A. Shoniregun, Sheridan Institute of Technology and Advanced 
Learning, Canada
Maaruf Ali, Oxford Brookes University, UK

Publicity and Workshop Chair
Galyna Akmayeva, Wessex Institute of Technology/University of Wales, UK

Industrial Chair
Jen-Yao Chung, IBM T. J. Watson Research Center, New York, USA

Steering Committee Chair
Charles A. Shoniregun, Sheridan Institute of Technology and Advanced 
Learning, Canada

Steering Committees
Paul Hofmann, Vice President Research, SAP Labs, USA
Brendan O’Shea, Dublin Institute of Technology, Ireland
Liang-Jie (LJ) Zhang, IBM T. J. Watson Research Centre, New York, USA
Maaruf Ali, Oxford Brookes University, UK
Dragana Martinovic, University of Windsor, Canada
Victor Ralevich, Sheridan Institute of Technology and Advanced Learning, Canada
Ali Al-Dahoud, Al-Zaytoonah University of Jordan, Jordan
Charles Winer, Purdue University Calumet, USA



TECHNICAL PROGRAM COMMITTEES
Technical Program Committee members names and their affiliations are 
available at www.icitst.org



---------- Forwarded message ----------
Forwarded from: info (at) icitst.org

Subject: CALL FOR WORKSHOPS: The 4th International Conference for 
Internet Technology and Secured Transactions (ICITST-2009), Technical 
Co-Sponsored by IEEE UK/RI Section

******************
CALL FOR WORKSHOPS
******************

The 4th International Conference for Internet Technology and Secured 
Transactions (ICITST-2009), Technical Co-Sponsored by IEEE UK/RI 
Section, November 9–12, 2009, London, UK (www.icitst.org)

The 4th International Conference for Internet Technology and Secured 
Transactions (ICITST-2009) is co-sponsored by IEEE UK/RI Section. The 
purpose of these workshops is to provide a platform for presenting novel 
ideas in a less formal and possibly more focused way than the 
conferences themselves. It offers a good opportunity for young
researchers to present their work and to obtain feedback from an 
interested community. The format of each workshop is to be determined by 
the organisers, but it is expected that they contain ample time for 
general discussion. The preference is for one day workshops, but other 
schedules will also be considered.

The ICITST-2009 encourages you to submit workshop proposals. Workshop 
duration can be one day or one and half day.
All the accepted papers will be included in the conference proceedings. 
You can consider organising a workshop that is related to ICITST-2009 
topics.

Your workshop proposals will be reviewed by the Steering Committees and 
all the accepted papers will appear in the proceedings published by IEEE 
and fully indexed by IEEE Xplore and DBLP.


Important Dates

Workshop Proposal Submission: April 30, 2009
Notification of Workshop Acceptance: May 15, 2009


The proposal must include:

1. The name of the workshop.
2. A statement of goals for the workshop.
3. The names and addresses of the organisers.
4. The names of potential participants, such as program committee members.
5. A description of the plans for call for participation (e.g., call for papers).
6. The expected number of attendees and the planned length of the workshop.
7. The topic of the workshop should be relevant to the main conference 
   and details of any previous workshops.
8. The URL of the workshop web site.

The workshop paper submission and author notification due dates are at 
the discretion of the workshop organisers but not later than June 31, 
2009 in order to be included in the main conference proceedings.For all 
workshop organizers, if the workshop receives more than 20 valid 
submissions or accepts more than 10 quality papers at ICITST- 2009, the 
organisers will receive one free registration and ICITST-2009 
outstanding service certificate.

If you are interested in organising workshops for the IEEE ICITST-2009, 
please email your proposal to the
workshop (at) icitst.org


Steering Committee Chair
Charles A. Shoniregun, Sheridan Institute of Technology and Advanced 
Learning, Canada


Steering Committees
Paul Hofmann, Vice President Research, SAP Labs, USA
Brendan O’Shea, Dublin Institute of Technology, Ireland
Liang-Jie (LJ) Zhang, IBM T. J. Watson Research Centre, New York, USA
Maaruf Ali, Oxford Brookes University, UK
Dragana Martinovic, University of Windsor, Canada
Victor Ralevich, Sheridan Institute of Technology and Advanced Learning, Canada
Ali Al-Dahoud, Al-Zaytoonah University of Jordan, Jordan
Charles Winer, Purdue University Calumet, USA


TECHNICAL PROGRAM COMMITTEES
Technical Program Committee members names and their affiliations are 
available at www.icitst.org



---------- Forwarded message ----------
Forwarded from: info (at) icitst.org

Subject: CALL FOR SPECIAL TRACKS: The 4th International Conference for 
Internet Technology and Secured Transactions 2009 (ICITST-2009), 
Technical Co-Sponsored by IEEE UK/RI Section

***********************
CALL FOR SPECIAL TRACKS
***********************

The 4th International Conference for Internet Technology and Secured 
Transactions 2009 (ICITST-2009), Technical Co-Sponsored by IEEE UK/RI 
Section, November 9–12, 2009, London, UK (www.icitst.org)

The 4th International Conference for Internet Technology and Secured 
Transactions (ICITST-2009) is co-sponsored by IEEE UK/RI Section. The 
ICITST-2009 encourages you to submit special track proposals. All the 
accepted papers will be included in the conference proceedings. You can 
consider organising a special track that is related to ICITST-2009 
topics (Please see topics coverage at 
http://www.icitst.org/SpecialTracks.html)

The special track of ICITST-2009 will be the forum for high-quality 
presentations on innovative applications and engineering solutions. You 
are welcome to send email with any questions you might have to 
info (at) icitst.org
Authors should submit papers (8 pages MAXIMUM) with the same formatting 
rules as research papers. The reviews of submissions will be provided to 
authors during notification.

Your special track proposals will be reviewed by the Steering Committees 
and all the accepted special tracks will appear in the proceedings 
published by IEEE and fully indexed by IEEE Xplore and DBLP.


Please submit your special track paper to specialtracks (at) icitst.org

Abstract Submission Deadline: June 12, 2009
Full Paper Submission Due Date: June 19, 2009


Note: Please do NOT submit your special tracks to the regular research 
track. Double submissions will be
automatically rejected without review.


Steering Committees
Paul Hofmann, Vice President Research, SAP Labs, USA
Brendan O’Shea, Dublin Institute of Technology, Ireland
Liang-Jie (LJ) Zhang, IBM T. J. Watson Research Centre, New York, USA
Charles A. Shoniregun, Sheridan Institute of Technology and Advanced Learning, Canada
Maaruf Ali, Oxford Brookes University, UK
Dragana Martinovic, University of Windsor, Canada
Victor Ralevich, Sheridan Institute of Technology and Advanced Learning, Canada
Ali Al-Dahoud, Al-Zaytoonah University of Jordan, Jordan


TECHNICAL PROGRAM COMMITTEES
Technical Program Committee members names and their affiliations are 
available at www.icitst.org


_______________________________________________      
Best Selling Security Books and More!
http://www.shopinfosecnews.org/
Received on Thu Feb 19 2009 - 00:27:44 PST

This archive was generated by hypermail 2.2.0 : Thu Feb 19 2009 - 00:37:17 PST