ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICITST 2013 - The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)

Date2013-12-09 - 2013-12-12

Deadline2013-06-30

VenueLondon, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttps://www.icitst.org

Topics/Call fo Papers

The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) will be held in London, UK. The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2013 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.
The topics in ICITST-2013 include but are not confined to the following areas:
Internet Application and Technology
Internet technologies
Internet Architecture
Internet of things
Broadband Access Technologies
Application Agents
Boundary Issues of Internet Security
Database Management
Data Models for Production Systems and Services
Artificial Intelligence and Expert Systems
IPSec Quality of Service
Knowledge Management
Embedded Systems
Defence Systems
Infonomics and e-Technology
Infonomics
Information Visualization
Information Management
Information Quality
Technology-Enabled Information
e-Learning
e-Commerce
e-Business
e-Government
e-Society
System Design and Security for e-Services
Synchronizing e-Security
Cyber warfare and Cyber Security
Surveillance Systems
Cyber Warfare Trends and Approaches
Social engineering
Template Protection and Liveliness detection
New theories and algorithms in biometrics
Formal Methods Application in Security
Operating Systems and Database Security
nterprise Systems Security
SCADA and Embedded systems security
Distributed and Pervasive Systems Security
Secure Software Development
Information Security
Collaborative Learning
Trust, Privacy and Data Security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Cryptography
Secure Communications
Authentication Techniques
Chaos-based Data Security
MANET Security
Wireless Sensor Network Security
Organization Considerations in Security Policy Formulation and Implementations
Digital Forensics and Crimes
Biometrics
Cyber Security
Multimedia and Web Services
Intelligent Multimedia and its Data Management
Multimedia Information Systems
Multimedia Security
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0.
Web Services
XML and other extensible languages
Semantic Web and Ontology
Digital Forensic
Data leakage and Database forensics
Forensics of Virtual and Cloud Environments
Network Forensics and Traffic Analysis
Information Hiding
File System and Memory Analysis
Executable Content and Content Filtering
Anti-Forensics Techniques
Malware forensics
Evidentiary Aspects of Digital Forensics
Large-Scale Investigations
New threats and Non-Traditional approaches
Incident Handling and Penetration Testing
Ubi/Cloud Computing
Authentication and Access Control for Data Protection in Ubi/Cloud Computing
Context-Awareness and its Data Mining for UbiCom
Data Grids
Distributed Information Systems
Human-Computer Interface and Interaction for UbiCom
Ubiquitous Systems
USN/RFID Service
Smart Homes and its Business Model for UbiCom Service
Security and Data Management for UbiCom
Peer to Peer Data Management
New Novel Mechanism and Application for Ubi/Cloud Computing
Cloud Security
Secure Virtual Infrastructure and Private Cloud
Cryptographic Enforcement of Multi-Tenancy
Cloud Requirements for PaaS and SaaS
Security Policy and Privacy Requirements
CloudAudit Protocol
Corporate Governance
Laws and Regulations
Threats, Vulnerabilities, and Risk Management
Disaster Recovery Planning
Critical Infrastructure Protection
Digital Rights Management
Security Policies and Trust Management
Identity Management
Decidability and Complexity
Economics of Security
Fraud Management
Research in Progress
Ongoing research from undergraduates, graduates/postgraduates and professionals
Collaborative Research
Future Technologies
Panel Discussion
Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.
Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.
The proposal must include:
Title
Panel Chair(s) (if necessary)
Speakers Name, Affiliation and Email
Scope
Objective and motivation
The ICITST-2013 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before September 30, 2013. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).
All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the ICITST-2013, please email your proposal to the pandis-AT-icitst.org. Submissions should be in MS Word format.
Virtual Presentation (Video Conferencing)
We understand that some presenters will not be able to make the trip to London to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The ICITST-2013 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.
You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to papers-AT-icitst.org

Last modified: 2013-01-17 20:22:00