ICITCS 2012 - The International Conference on IT Convergence and Security 2012 (ICITCS 2012)
Topics/Call fo Papers
December 5-7, 2012, Republic of Korea
http://icitcs2012.kcis.kr
OVERVIEW
The International Conference on IT Convergence and Security (ICITCS 2012) will be held in December 5-7, 2012, Republic of Korea
As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information convergence. In the process of information convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. The goal of this conference is to discover a new progressive technology by upgrading the previous technologies and to solve the technical problems that may have occurred in the process of converging technology in various fields of industry.
At ICITCS 2012, IT experts, researchers, and practitioners from each field will be invited to share ideas and research technologies; moreover, encouraged to cooperate with each other to overcome the confronted technical problems. As a result, this conference will become a place of knowledge where a variety of effects can be created.
The conference seeks contributions presenting novel research results in all aspects of IT Convergence and Security. Submitted papers will be peer-reviewed and the accepted papers and posters will be published in ICITCS 2012 proceedings published by Springer (ISSN 1876-1100) and indexed by ISI and Scopus. Furthermore, the selected papers will be published in the special issues of prestigious international journals after further revision.
IMPORTANT DATES
Papers Submission Deadline: September 3, 2012
Notification of Acceptance: September 27. 2012
Final Papers Deadline: 5 October, 2012
SPECIAL ISSUE
Information
Multimedia Tools and Applications [pending]
Wireless Personal Communications, WIRE [pending]
More to be announced
PAPER SUBMISSION AND GUIDELINE
- The paper must be written in English and readable
- The paper must be prepared using only the Word (doc) template found at the bottom of this page or in the announcement section of ICITCS 2012 webpage
- Papers must be submitted Only in Portable Document Format (PDF)
- The paper length limit for full paper: 4 - 8 pages including all figures
Authors of accepted papers, or at least one of them, are requested to register and present their work at the conference.
Without registration, we cannot guarantee that your paper(s) will be published.
PAPER SUBMISSION
Papers must be original, has not been previously published, and currently not under consideration for publication elsewhere. Authors must clearly explain the contribution of the work in terms of its theoretical and/or practical value and relationship to previous work.
SCOPE AND TOPICS
Topics of interest may include one or more of the following (but are not limited to) themes;
Track 1. Security Fundamentals
Cryptography and Number Theory
Authentication, Authorization and Accounting
Secure Key Creation and Distribution
Private Information Security
Biometrics Security
Financial Security
Malicious Code
Theories, Methods, Tools and Applications in Security
Track 2. Industrial & Business Information Security
Security in E-commerce and E-business
Security Applications and Services
IPTV Security Services in the Broadband convergence Network (BcN)
Security for Open convergence system
Distributed Systems Security
Trust model and Management
Emerging Challenges in Industrial Security and Assurance
Track 3. Security Protocols and Applications
Security Protocols for Wireless and Mobile
Constraint-based Analysis of Security Protocols
Light-weight Authentication, Authorization and accountability
Identity and Trust Management
Secure Communications
Intrusion Detection and Prevention
PKI & Digital Signatures
Track 4. Convergence Security
Secure Collaboration in a Ubiquitous Environment
Corporate Security & Electronic Access Control Solutions: RFID-based, Biometrics-based, etc
Physical and Logical Security Convergence
Security and Privacy Challenges in the Healthcare Domain
Multimedia Security Services in Cloud Computing
Access Control and Privacy Protection in Pervasive Computing
Track 5. IT Convergence Applications
IT Convergence Technology
Trans-Media and IT Convergence
Contents and Application convergence
Knowledge Convergence Services
Digital Convergence
Hybrid of IT/BT, IT/NT
Embedded SW, Middleware and Operating Systems
Convergence Application Security
Track 6. Mobile Computing and Future Networks
Multimodal Mobile and Ubiquitous Services
Mobile Applications and Convergence System
Mobile, Wireless and Wired Convergence
Mobile Convergence Service Architecture
Optical Network and Systems
Next Generation Networks and Media
Convergence Networks and Communications
u-City Convergence Technology
Future Information Convergence Systems
Track 7. Multimedia and Information Visualization
Multimedia content distribution
Converged Video Surveillance
Image processing & visualization for Convergence
Vision systems, including multi-camera systems
Converged Information Visualization
Multimedia and Information Convergence Security
Track 8. Convergence Data Mining and Artificial Intelligence
Database and Data Mining
Service Mining in Marketing, CRM and Business Intelligence
Artificial Life and Artificial Immune System
Biomedical Devices, sensors, and Artificial Organs
Convergence Technology for Data Mining and AI
Track 9. Web Technology and Software Engineering
Service-centric software engineering
Web Technology and Internet Commerce
Web data mining and information retrieval
Agent-based trade-and mediating services
Convergence Web Technology
Web Security
Track 10. Green Convergence Services
Green computing methodologies and paradigms
Power aware, thermal aware data center design, service, and application
Energy awareness in network equipment and operations
Energy efficient network infrastructures and protocols
Green Computer Security
ORGANIZER
Center for Industry Security [CIS]
Kyonggi University
Convergence Security Association
CONTACT
For further information regarding the workshop and paper submission, please contact to Joanna Kim, Conference Secretariat (jason-AT-global.kcis.kr).
http://icitcs2012.kcis.kr
OVERVIEW
The International Conference on IT Convergence and Security (ICITCS 2012) will be held in December 5-7, 2012, Republic of Korea
As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information convergence. In the process of information convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. The goal of this conference is to discover a new progressive technology by upgrading the previous technologies and to solve the technical problems that may have occurred in the process of converging technology in various fields of industry.
At ICITCS 2012, IT experts, researchers, and practitioners from each field will be invited to share ideas and research technologies; moreover, encouraged to cooperate with each other to overcome the confronted technical problems. As a result, this conference will become a place of knowledge where a variety of effects can be created.
The conference seeks contributions presenting novel research results in all aspects of IT Convergence and Security. Submitted papers will be peer-reviewed and the accepted papers and posters will be published in ICITCS 2012 proceedings published by Springer (ISSN 1876-1100) and indexed by ISI and Scopus. Furthermore, the selected papers will be published in the special issues of prestigious international journals after further revision.
IMPORTANT DATES
Papers Submission Deadline: September 3, 2012
Notification of Acceptance: September 27. 2012
Final Papers Deadline: 5 October, 2012
SPECIAL ISSUE
Information
Multimedia Tools and Applications [pending]
Wireless Personal Communications, WIRE [pending]
More to be announced
PAPER SUBMISSION AND GUIDELINE
- The paper must be written in English and readable
- The paper must be prepared using only the Word (doc) template found at the bottom of this page or in the announcement section of ICITCS 2012 webpage
- Papers must be submitted Only in Portable Document Format (PDF)
- The paper length limit for full paper: 4 - 8 pages including all figures
Authors of accepted papers, or at least one of them, are requested to register and present their work at the conference.
Without registration, we cannot guarantee that your paper(s) will be published.
PAPER SUBMISSION
Papers must be original, has not been previously published, and currently not under consideration for publication elsewhere. Authors must clearly explain the contribution of the work in terms of its theoretical and/or practical value and relationship to previous work.
SCOPE AND TOPICS
Topics of interest may include one or more of the following (but are not limited to) themes;
Track 1. Security Fundamentals
Cryptography and Number Theory
Authentication, Authorization and Accounting
Secure Key Creation and Distribution
Private Information Security
Biometrics Security
Financial Security
Malicious Code
Theories, Methods, Tools and Applications in Security
Track 2. Industrial & Business Information Security
Security in E-commerce and E-business
Security Applications and Services
IPTV Security Services in the Broadband convergence Network (BcN)
Security for Open convergence system
Distributed Systems Security
Trust model and Management
Emerging Challenges in Industrial Security and Assurance
Track 3. Security Protocols and Applications
Security Protocols for Wireless and Mobile
Constraint-based Analysis of Security Protocols
Light-weight Authentication, Authorization and accountability
Identity and Trust Management
Secure Communications
Intrusion Detection and Prevention
PKI & Digital Signatures
Track 4. Convergence Security
Secure Collaboration in a Ubiquitous Environment
Corporate Security & Electronic Access Control Solutions: RFID-based, Biometrics-based, etc
Physical and Logical Security Convergence
Security and Privacy Challenges in the Healthcare Domain
Multimedia Security Services in Cloud Computing
Access Control and Privacy Protection in Pervasive Computing
Track 5. IT Convergence Applications
IT Convergence Technology
Trans-Media and IT Convergence
Contents and Application convergence
Knowledge Convergence Services
Digital Convergence
Hybrid of IT/BT, IT/NT
Embedded SW, Middleware and Operating Systems
Convergence Application Security
Track 6. Mobile Computing and Future Networks
Multimodal Mobile and Ubiquitous Services
Mobile Applications and Convergence System
Mobile, Wireless and Wired Convergence
Mobile Convergence Service Architecture
Optical Network and Systems
Next Generation Networks and Media
Convergence Networks and Communications
u-City Convergence Technology
Future Information Convergence Systems
Track 7. Multimedia and Information Visualization
Multimedia content distribution
Converged Video Surveillance
Image processing & visualization for Convergence
Vision systems, including multi-camera systems
Converged Information Visualization
Multimedia and Information Convergence Security
Track 8. Convergence Data Mining and Artificial Intelligence
Database and Data Mining
Service Mining in Marketing, CRM and Business Intelligence
Artificial Life and Artificial Immune System
Biomedical Devices, sensors, and Artificial Organs
Convergence Technology for Data Mining and AI
Track 9. Web Technology and Software Engineering
Service-centric software engineering
Web Technology and Internet Commerce
Web data mining and information retrieval
Agent-based trade-and mediating services
Convergence Web Technology
Web Security
Track 10. Green Convergence Services
Green computing methodologies and paradigms
Power aware, thermal aware data center design, service, and application
Energy awareness in network equipment and operations
Energy efficient network infrastructures and protocols
Green Computer Security
ORGANIZER
Center for Industry Security [CIS]
Kyonggi University
Convergence Security Association
CONTACT
For further information regarding the workshop and paper submission, please contact to Joanna Kim, Conference Secretariat (jason-AT-global.kcis.kr).
Other CFPs
- The 11th Australasian Symposium on Parallel and Distributed Computing
- Computational Data Analytics Workshop 2012
- Manufacturing Engineering Society International Conference
- 12th International Workshop on Automated Verification of Critical Systems
- 6th IEEE International Conference on Software Testing, Verification, and Validation
Last modified: 2012-06-12 22:34:20