ICITST 2012 - The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012)
Date2012-12-10
Deadline2012-06-30
VenueLondon, UK - United Kingdom
KeywordsInternet Application and Technology, Ubi/Cloud Computing, Information Security, Multimedia and Web Services, Infonomics and e-Technology,
Websitehttp://www.icitst.org
Topics/Call fo Papers
The 7th International Conference for Internet Technology and Secured
Transactions (ICITST-2012) is Technical Co-sponsored by IEEE UK/RI
Computer Chapter. The ICITST is an international refereed conference
dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The topics in ICITST-2012 include but are not confined to the
following areas:
Internet Application and Technology:
* Internet Architecture
* Internet of things
* Broadband Access Technologies
* Application Agents
* Boundary Issues of Internet Security
* Database Management
* Data Models for Production Systems and Services
* Artificial Intelligence and Expert Systems
* IPSec Quality of Service
* Knowledge Management
* Embedded Systems
* Defence Systems
Ubi/Cloud Computing:
* Authentication and Access Control for Data Protection in Ubi/Cloud Computing
* Context-Awareness and its Data Mining for UbiCom
* Data Grids
* Distributed Information Systems
* Human-Computer Interface and Interaction for UbiCom
* Ubiquitous Systems
* USN/RFID Service
* Smart Homes and its Business Model for UbiCom Service
* Security and its Data Management for UbiCom
* Peer to Peer Data Management
* New Novel Mechanism and Application for Ubi/Cloud Computing
Information Security:
* Trust, Privacy and Data Security
* Network Security Issues and Protocols
* Security Challenges and Content Authoring
* Cryptography
* Secure Communications
* Authentication Techniques
* Chaos-based Data Security
* MANET Security
* Wireless Sensor Network Security
* Organization Considerations in Security Policy Formulation and Implementations
* Digital Forensics and Crimes
* Biometrics
* Cyber Security
Multimedia and Web Services:
* Intelligent Multimedia and its Data Management
* Multimedia Information Systems
* Multimedia Security
* Web Databases
* Web Metrics and its Applications
* Web Mining including Web Intelligence and Web 3.0.
* Web Services
* XML and other extensible languages
* Semantic Web and Ontology
Infonomics and e-Technology:
* Infonomics
* Information Visualization
* Information Management
* Information Quality
* Technology-Enabled Information
* e-Learning
* e-Commerce
* e-Business
* e-Government
* e-Society
* System Design and Security for e-Services
* Synchronizing e-Security
IMPORTANT DATES
Full Paper Submission Date: June 30, 2012
Extended Abstract (Work in Progress) Submission Date: July 31, 2012
Proposal for Workshops and Tutorials: May 31, 2012
Notification of Workshop and Tutorial Acceptance: June 05, 2012
Proposal for Industrial Presentation: April 30, 2012
Notification of Extended Abstract Acceptance/Rejection: August 15, 2012
Notification of Industrial Presentation Acceptance: May 10, 2012
Notification of Paper Acceptance/Rejection: July 31, 2012
Camera Ready Extended Abstract Due: August 31, 2012
Camera Ready Paper Due: August 15, 2012
Early Registration Deadline (Authors only): October 31, 2012
Late Registration Deadline (Authors only): November 15, 2012
Participants Registration: May 01 to December 14, 2012
Conference Dates: December 10-12, 2012
For more details, please contact info-AT-icitst.org
Transactions (ICITST-2012) is Technical Co-sponsored by IEEE UK/RI
Computer Chapter. The ICITST is an international refereed conference
dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The topics in ICITST-2012 include but are not confined to the
following areas:
Internet Application and Technology:
* Internet Architecture
* Internet of things
* Broadband Access Technologies
* Application Agents
* Boundary Issues of Internet Security
* Database Management
* Data Models for Production Systems and Services
* Artificial Intelligence and Expert Systems
* IPSec Quality of Service
* Knowledge Management
* Embedded Systems
* Defence Systems
Ubi/Cloud Computing:
* Authentication and Access Control for Data Protection in Ubi/Cloud Computing
* Context-Awareness and its Data Mining for UbiCom
* Data Grids
* Distributed Information Systems
* Human-Computer Interface and Interaction for UbiCom
* Ubiquitous Systems
* USN/RFID Service
* Smart Homes and its Business Model for UbiCom Service
* Security and its Data Management for UbiCom
* Peer to Peer Data Management
* New Novel Mechanism and Application for Ubi/Cloud Computing
Information Security:
* Trust, Privacy and Data Security
* Network Security Issues and Protocols
* Security Challenges and Content Authoring
* Cryptography
* Secure Communications
* Authentication Techniques
* Chaos-based Data Security
* MANET Security
* Wireless Sensor Network Security
* Organization Considerations in Security Policy Formulation and Implementations
* Digital Forensics and Crimes
* Biometrics
* Cyber Security
Multimedia and Web Services:
* Intelligent Multimedia and its Data Management
* Multimedia Information Systems
* Multimedia Security
* Web Databases
* Web Metrics and its Applications
* Web Mining including Web Intelligence and Web 3.0.
* Web Services
* XML and other extensible languages
* Semantic Web and Ontology
Infonomics and e-Technology:
* Infonomics
* Information Visualization
* Information Management
* Information Quality
* Technology-Enabled Information
* e-Learning
* e-Commerce
* e-Business
* e-Government
* e-Society
* System Design and Security for e-Services
* Synchronizing e-Security
IMPORTANT DATES
Full Paper Submission Date: June 30, 2012
Extended Abstract (Work in Progress) Submission Date: July 31, 2012
Proposal for Workshops and Tutorials: May 31, 2012
Notification of Workshop and Tutorial Acceptance: June 05, 2012
Proposal for Industrial Presentation: April 30, 2012
Notification of Extended Abstract Acceptance/Rejection: August 15, 2012
Notification of Industrial Presentation Acceptance: May 10, 2012
Notification of Paper Acceptance/Rejection: July 31, 2012
Camera Ready Extended Abstract Due: August 31, 2012
Camera Ready Paper Due: August 15, 2012
Early Registration Deadline (Authors only): October 31, 2012
Late Registration Deadline (Authors only): November 15, 2012
Participants Registration: May 01 to December 14, 2012
Conference Dates: December 10-12, 2012
For more details, please contact info-AT-icitst.org
Other CFPs
- Extended Deadline: 4th Automata, Theory and Applications Workshop (A-CSC12)
- The 2012 First International Conference on Smart Media and Applications
- AAAHRP 2013 Black History Conference
- The 2012 International Conference on Information Science for Industry
- The 2012 International Conference on Education and Learning
Last modified: 2011-12-16 06:17:45