ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ISECS 2011 - Fourth International Symposium on Electronic Commerce and Security isecs2011

Date2011-06-24

Deadline2011-03-30

VenueShanghai, China China

Keywords

Websitehttps://www.wcse.org.cn

Topics/Call fo Papers

The e-commerce gives work and the life of people to bring the new commerce moment with facilitating, but also is being faced with jumbo challenge. Because an important technology characteristic of e-commerce is using IT's technology to come to transmit and deals with commerce information. Therefore in fact computer network safety is closed with commercial affairs business safety, they couldn’t be divided, both supplement and complement each other, and are integral. Not having computer network safety as the foundation, commercial affairs business safety is just as the castles in the air, and does not have no way to talk. The safety is one of the huge challenges that the e-commerce is faced with, and it becomes hindrance follow-on bottle neck of e-commerce. The commercial affairs businesses all will not be carried on by way of the cross-domain communication environment of a danger in any individual, enterprise or commerce organization, and can lead to so the various business information to be leaked or destroys, thus create the jumbo interest to lose. The safety is the important guarantee of e-commerce life-force, and becomes again at the same time restricting one of follow-on bottle of neck factor e-commerce at present.We are soliciting papers that present recent results, as well as more speculative presentations that discuss research challenges, define new applications, propose methodologies for evaluating and the roadmap for achieving the vision of Electronic Commerce and Security, including but not limited to the following topics:
Innovative e-business models
Mobile business
Business process integration
Business process re-engineering
e-Marketplaces, e-Hubs and portals
Digital goods and products
User behavior modeling
Inter-organizational systems
e-Commerce content management
e-Negotiations, auctioning and contracting

Supply, demand, and value chains
Enterprise application integration
Graphics and Imaging Processing
Pattern recognition
Computer vision
Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Applied Cryptography
Electronic Commerce Security Distributed Systems Security
Database Security
Information Hiding and Watermarking
Key Management and Key Recovery
Operating System Security
Risk Evaluation and Security
Trusted Computing
Intelligent Computing
Wireless Sensor Network

Last modified: 2011-03-14 18:02:11