[Sigcr-l] ICITST-2009: Final Call for Extended Abstracts and Workshop Proposals.

Charles Shoniregun charles.shoniregun at sheridanc.on.ca
Thu Apr 23 23:52:42 EDT 2009


Kindly email this Call for Extended Abstracts and Workshops 
to your colleagues, faculty members and postgraduate students.Apologies for cross-postings.
FINAL CALL FOR EXTENDED ABSTRACTS AND WORKSHOP PROPOSALS
The 4th International Conference for Internet Technology 
and Secured Transactions (ICITST-2009), Technical 
Co-Sponsored by IEEE UK/RI Section, November 9–12, 2009, 
London, UK (www.icitst.org)                                 
                                                                                                                         
The 4th International Conference for Internet Technology 
and Secured Transactions (ICITST-2009) is co-sponsored  by 
IEEE UK/RI Section. The ICITST is an international refereed 
conference dedicated to the advancement of the theory and 
practical implementation of secured Internet transactions 
and to fostering discussions on information technology 
evolution. The ICITST aims to provide a highly professional 
and comparative academic research forum that promotes 
collaborative excellence between academia and industry. 
The objectives of the ICITST are to bridge the knowledge 
gap between academia and industry, promote research esteem 
in secured Internet transactions and the importance of 
information technology evolution to secured transactions. 
The ICITST-2009 invites research papers that encompass 
conceptual analysis, design implementation and performance 
evaluation. All the accepted papers will appear in the 
proceedings published by IEEE and fully indexed by IEEE 
Xplore. All the ICITST papers are indexed by DBLP. 
The topics in ICITST-2009 include but are not confined to the 
following areas:
 
*  Application of agents 
*  Application security 
*  Blended Internet security methods 
*  Biometrics 
*  Boundary issues of Internet security 
*  Broadband access technologies 
*  Challenges of content authoring 
*  Data mining security 
*  E-society 
*  Globalisation of information society 
*  Government, and corporate Internet security policy 
*  Internet architecture 
*  Infonomics 
*  IPSec quality of services 
*  Patentability 
*  Regulation, self-regulation, and co-regulation Web services 
*  Secured database systems 
*  Synchronising e-security 
*  Software Architectures
*  Technology-enabled information 
*  Trust, privacy, and data security 
*  Wireless transactions 
*  Context-Awareness and its Data mining for Ubi-com service 
*  Human-Computer Interface and Interaction for Ubi-com 
*  Smart Homes and its business model for Ubi-com service 
*  Intelligent Multimedia Service and its Data management for Ubi-com 
*  USN / RF-ID for Ubi-com service 
*  Network security issues, protocols, data security in Ubi-com 
*  Database protection for Ubi-com 
*  Privacy Protection and Forensic in Ubi-com 
*  Multimedia Security in Ubi-com 
*  Quality of Service Issues 
*  Authentication and Access control for data protection in Ubi-com 
*  Information visualization 
*  Web services
*  Service, Security and its Data management for U-commerce 
*  New novel mechanism and Applications for Ubi-com 
*  Information Management 
*  Multimedia Information Systems 
*  Information Retrieval 
*  Natural Language Processing 
*  Digital Libraries 
*  Data and Information Quality Management 
*  Data Grids, Data and Information Quality 
*  Database Management 
*  Web Databases 
*  Temporal and Spatial Databases 
*  Data Mining 
*  Web Mining including Web Intelligence and Web 3.0 
*  E-Learning, eCommerce, e-Business and e-Government 
*  Web Metrics and its applications 
*  XML and other extensible languages 
*  Semantic Web and Ontology 
*  Human-Computer Interaction 
*  Artificial Intelligence and Expert Systems 
*  Knowledge Management 
*  Ubiquitous Systems 
*  Peer to Peer Data Management 
*  Interoperability 
*  Mobile Data Management 
*  Data Models for Production Systems and Services 
*  Data Exchange issues and Supply Chain 
*  Data Life Cycle in Products and Processes 
*  Case Studies on Data Management, Monitoring and Analysis 
*  Security and Access Control 
*  Embedded Systems 
*  Defence Systems 
*  Information Content Security 
*  Software Architecture 
*  System design and verification 
*  Mobile, Ad Hoc and Sensor Network Security 
*  Distributed information systemsIMPORTANT DATES
  
Extended Abstract (Work in Progress) Submission Date: April 30, 2009  
Proposal for Workshops and Tutorials: April 30, 2009  
Notification of Workshop Acceptance: May 15, 2009  
Notification of Extended Abstract Acceptance/Rejection: May 15, 2009  
Camera Ready Paper Due: September 01, 2009  
Author(s) and Participant(s) Registration: August 01, 2009  
Early Bird registration: August 01, 2009  
Late registration: September 30, 2009 
Conference Dates: November 09-12, 2009 
The ICITST also encourages organisations to submit their Job Fair 
Booth Reservations and/or Exhibit Proposals. If your organisation 
is interested, kindly submit a brief Proposal (not more than 1 side
of A4 page) to jobfair at icitst.org 
For more details, visit www.icitst.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.asis.org/pipermail/sigcr-l/attachments/20090424/fc0ddc8b/attachment.html 


More information about the Sigcr-l mailing list