WorldCIS 2012 - World Congress on Internet Security (WorldCIS-2012)
Topics/Call fo Papers
The World Congress on Internet Security (WorldCIS-2012) is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
On the ubiquitous networking environments, information is explosively used for various kinds of purposes. From a service perspective, a number of context or ambient aware services are envisaged for "ubiquitous networking" but based on the context security remains an issue.
The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and and to fostering discussions on information technologies, information systems and globa security applications. The WorldCIS-2012 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation.
Topics of Interest
Original papers are invited on recent advances in Internet, Computer Communications and Networking Scuerity. The topics in WorldCIS-2012 include but are not confined to the following areas:
Access Control
Accountability
Anonymity
Application security
Attacks and defenses
Authentication
Censorship and censorship-resistance
Distributed systems security
Embedded systems security
Intrusion detection
Language-based security
Malware
Metrics
Network security
Privacy-preserving
Resource usage control
Security for mobile computing
Security models
systems Protocol security
Secure information flow
Security and privacy policies
Security architectures
System security
Usability and security
Web security
Internet Application and Technology
Internet Architecture and Technologies
Anonymity and Privacy
Artificial Intelligence and Expert Systems
Network security
Broadband Access Technologies
Application Agents
Boundary Issues of Internet Security
Database Management
Data Models for Production Systems and Services
Data Provenance
Defence SystemsInternet Security
Electronic voting
Embedded Systems
IPSec Quality of Service
Knowledge Management
Modeling and verifying
Security, Trust and Privacy
Self-Organizing Networks
Sensor nets and embedded systems
Service overlays
Switches and switching
Topology characterization and Inference
Traffic Measurement and Analysis
Traffic Engineering and Control
Data Security
Virtual and Overlay Networks
Quantification of Integrity
Information Security
Biometrics
Chaos-based Data Security
Cryptography
Collaborative Learning
Cyber Security Congestion control
Content Distribution
Cross Layer Design and Optimization
Cyber-physical computing/networking
Distributed Systems Security
Information flow monitor
Language-based security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Secure Communications
Authentication Techniques
MANET Security
Wireless Sensor Network Security
Organization Considerations in Security Policy
Digital Forensics and Crimes
Formulation and Implementations
Geographic information systems
Privacy Protection
Regulations
Quantitative Information Flow
Multimedia and Web Services
Intelligent Multimedia and its Data Management
Multimedia Information Systems
Multimedia Security
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0.
XML and other extensible languages
Semantic Web and Ontology
Web services and performance
Secured Database Systems
Security in Data Mining
Defence Systems
Virtual Reality
Hardware-Based Security
Trust and trust management
Electronic Society
Trust, Privacy and Data Security
Anonymity, Pseudonymity, and Unlinkability
data Correlation and Leakage Attacks
Privacy Enhancing Technologies
Wireless Privacy
User Profiling
Information Dissemination Control
Dynamic vs. Static Flow-Sensitive Security Analysis
Network Security
Ad hoc Mobile Networks Security
Addressing and Location Management
Broadband Access Technologies
Blended Internet Security Methods
Boundary Issues of Internet Security
Capacity Planning
Cellular and Broadband Wireless Nets
Formal verification of privacy for RFID systems
Optical Networks
Middleware Support for Networking
Mobility Models and Systems
Multicast and Anycast
Multimedia Protocols and Networking
Network Applications and Services
Network Architectures
Network Simulation and Emulation
Novel Network Architectures
Network and Protocol Architectures
Peer-to-Peer Communications
Performance Evaluation
Power Control and Management
Protocols and Standards
Resource Allocation and Management
Wireless Mesh Networks and Protocols
Ubi/Cloud Computing
Authentication and Access Control for Data Protection in Ubi/Cloud Computing
Context-Awareness and its Data Mining for UbiCom
Data Grids
Distributed Information Systems
Forensic in Ubi-com
Human-Computer Interface and Interaction for UbiCom
Ubiquitous Systems
USN/RFID Service
Smart Homes and its Business Model for UbiCom Service
Security and its Data Management for UbiCom
Peer to Peer Data Management
New Novel Mechanism and Application for Ubi/Cloud Computing
Delay/disruption tolerant networks
End Users
Enabling Technologies for the Internet
Implementation and Experimental Testbeds
Quality of Service Issues
Research in Progress
Ongoing Research from Undergraduates, Graduates/Postgraduates and Professionals
Future Internet Design and Applications
Panel Discussion
Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.
Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.
The proposal must include:
? Title
? Panel Chair(s) (if necessary)
? Speakers Name, Affiliation and Email
? Scope
? Objective and motivation
The WorldCIS-2012 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before January 31, 2012. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).
All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the WorldCIS-2012, please email your proposal to the pandis-AT-worldcis.org Submissions should be in MS Word format.
Virtual Presentation (Video Conferencing)
We understand that some presenters will not be able to make the trip to Canada to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The WorldCIS-2012 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.
You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to papers-AT-worldcis.org
All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewed journals.
On the ubiquitous networking environments, information is explosively used for various kinds of purposes. From a service perspective, a number of context or ambient aware services are envisaged for "ubiquitous networking" but based on the context security remains an issue.
The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and and to fostering discussions on information technologies, information systems and globa security applications. The WorldCIS-2012 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation.
Topics of Interest
Original papers are invited on recent advances in Internet, Computer Communications and Networking Scuerity. The topics in WorldCIS-2012 include but are not confined to the following areas:
Access Control
Accountability
Anonymity
Application security
Attacks and defenses
Authentication
Censorship and censorship-resistance
Distributed systems security
Embedded systems security
Intrusion detection
Language-based security
Malware
Metrics
Network security
Privacy-preserving
Resource usage control
Security for mobile computing
Security models
systems Protocol security
Secure information flow
Security and privacy policies
Security architectures
System security
Usability and security
Web security
Internet Application and Technology
Internet Architecture and Technologies
Anonymity and Privacy
Artificial Intelligence and Expert Systems
Network security
Broadband Access Technologies
Application Agents
Boundary Issues of Internet Security
Database Management
Data Models for Production Systems and Services
Data Provenance
Defence SystemsInternet Security
Electronic voting
Embedded Systems
IPSec Quality of Service
Knowledge Management
Modeling and verifying
Security, Trust and Privacy
Self-Organizing Networks
Sensor nets and embedded systems
Service overlays
Switches and switching
Topology characterization and Inference
Traffic Measurement and Analysis
Traffic Engineering and Control
Data Security
Virtual and Overlay Networks
Quantification of Integrity
Information Security
Biometrics
Chaos-based Data Security
Cryptography
Collaborative Learning
Cyber Security Congestion control
Content Distribution
Cross Layer Design and Optimization
Cyber-physical computing/networking
Distributed Systems Security
Information flow monitor
Language-based security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Secure Communications
Authentication Techniques
MANET Security
Wireless Sensor Network Security
Organization Considerations in Security Policy
Digital Forensics and Crimes
Formulation and Implementations
Geographic information systems
Privacy Protection
Regulations
Quantitative Information Flow
Multimedia and Web Services
Intelligent Multimedia and its Data Management
Multimedia Information Systems
Multimedia Security
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0.
XML and other extensible languages
Semantic Web and Ontology
Web services and performance
Secured Database Systems
Security in Data Mining
Defence Systems
Virtual Reality
Hardware-Based Security
Trust and trust management
Electronic Society
Trust, Privacy and Data Security
Anonymity, Pseudonymity, and Unlinkability
data Correlation and Leakage Attacks
Privacy Enhancing Technologies
Wireless Privacy
User Profiling
Information Dissemination Control
Dynamic vs. Static Flow-Sensitive Security Analysis
Network Security
Ad hoc Mobile Networks Security
Addressing and Location Management
Broadband Access Technologies
Blended Internet Security Methods
Boundary Issues of Internet Security
Capacity Planning
Cellular and Broadband Wireless Nets
Formal verification of privacy for RFID systems
Optical Networks
Middleware Support for Networking
Mobility Models and Systems
Multicast and Anycast
Multimedia Protocols and Networking
Network Applications and Services
Network Architectures
Network Simulation and Emulation
Novel Network Architectures
Network and Protocol Architectures
Peer-to-Peer Communications
Performance Evaluation
Power Control and Management
Protocols and Standards
Resource Allocation and Management
Wireless Mesh Networks and Protocols
Ubi/Cloud Computing
Authentication and Access Control for Data Protection in Ubi/Cloud Computing
Context-Awareness and its Data Mining for UbiCom
Data Grids
Distributed Information Systems
Forensic in Ubi-com
Human-Computer Interface and Interaction for UbiCom
Ubiquitous Systems
USN/RFID Service
Smart Homes and its Business Model for UbiCom Service
Security and its Data Management for UbiCom
Peer to Peer Data Management
New Novel Mechanism and Application for Ubi/Cloud Computing
Delay/disruption tolerant networks
End Users
Enabling Technologies for the Internet
Implementation and Experimental Testbeds
Quality of Service Issues
Research in Progress
Ongoing Research from Undergraduates, Graduates/Postgraduates and Professionals
Future Internet Design and Applications
Panel Discussion
Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.
Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.
The proposal must include:
? Title
? Panel Chair(s) (if necessary)
? Speakers Name, Affiliation and Email
? Scope
? Objective and motivation
The WorldCIS-2012 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before January 31, 2012. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).
All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the WorldCIS-2012, please email your proposal to the pandis-AT-worldcis.org Submissions should be in MS Word format.
Virtual Presentation (Video Conferencing)
We understand that some presenters will not be able to make the trip to Canada to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The WorldCIS-2012 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.
You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to papers-AT-worldcis.org
All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewed journals.
Other CFPs
- Virtual Execution Environments 2012
- Developments in Power System Protection - Protecting the Smart Grid
- 2011 3rd International Conference on Computer Technology and Development
- 1st Taibah University International Conference on Computing and Information Technology
- Entrepreneurship, Family Firms and Economic Development
Last modified: 2011-10-14 19:00:57