TUN-MM 2010 - Special Session on Trusted Ubiquitous Networks & Multimedia Contents Protection for International Conference on High Performance Computing & Simulation
Topics/Call fo Papers
Special Session on Trusted Ubiquitous Networks & Multimedia Contents Protection (TUN-MM 2010)
CALL FOR PAPERS
As part of
The International Conference on High Performance Computing & Simulation (HPCS 2010)
http://cisedu.us/cis/hpcs/10/main/callForPapers.js...
In conjunction with
The 6th International Wireless Communications and Mobile Computing Conference (IWCMC 2010)
Extension Submission Deadline: February 28, 2010
SCOPE AND OBJECTIVES
Recent years have witnessed rapid developments of the information communication technology and the Next-Generation Internet. 3G and 4G wireless mobile networks have been striding to a large-scale deployment and application. So, we have seen the potential and value for new technologies from a variety of digital networks to various interconnected digital devices, which made it possible to realize the ubiquitous network and society.
The ubiquitous network could enable a convenient connection ýanytime, anywhere, anything, anyoneý to the information communications network. Yet, it is necessary for users to establish a highly secure and reliable environment in which they could enjoy ubiquitous digital services via ubiquitous network and connectivity. Establishing trustworthy ubiquitous network brings up some urgent and challenging issues.
In contrast to the cyberspace we have seen until now, the ubiquitous network will be capable of exchanging information more freely beyond the boundaries of time and distance. Unfortunately, in such environment, copyright infringement behaviors, such as illicit copying, malicious distribution, unauthorized usage, free sharing of copyright-protected digital contents, will also become a much more common phenomenon. Contents protection & Digital Rights Management (DRM) have a tangible goal to safeguard the rights and benefits of multimedia contents owners, copyrights holders, digital services providers, and even consumers in contents value chain. Some applications research frontiers, related to contents security, have emerged in recent years. These include subjects on trustworthy networks and transactions, secure digital multimedia broadcasting and controlled contents sharing. Researchers, contents industry engineers and administrators attempt to resort to the state-of-the-art technologies and ideas to protect valuable digital contents and services assets against attacks and IP piracy in the emerging ubiquitous network.
This special session aims to bring together related research works in the realm of Ubiquitous Network and Multimedia Contents Security, and further investigates and discusses trusted solutions and secure techniques for Ubiquitous Network and Ubiquitous Computing, as well as some open issues faced by digital contents owners/rights holders/multimedia services providers, who dedicate themselves to protect their Intellectual Property Rights and business benefits. In addition, novel ideas and research works from end consumersý perspective, such as privacy, trustworthiness and multimedia contents sharing in ubiquitous network society, will be embraced by the session.
The Session topics include (but are not limited to) the following:
* Digital Rights Management & Interoperability
* Methodologies for Establishing Trust Among Unknown/Un-trusted Entities
* Authentication, Authorization and Access Control in Ubiquitous Networks
* Metrics and Measurement Schemes
* Monitoring and Assessment
* IP, Privacy and Trust in Ubiquitous Networks
* Ubiquitous Computing & Web Services
* Secure Digital Multimedia Broadcasting
* Multimedia Contents Sharing & Risk Management
* Contents Security & Protection
PAPER SUBMISSIONS
You are invited to submit original and unpublished research works on above and other topics related to trusted ubiquitous networks and multimedia contents protection. Submitted papers must not have been published or simultaneously submitted elsewhere. Submission should include a cover page with authors\' names, affiliation addresses, fax numbers, phone numbers, and email addresses. Please, indicate clearly the corresponding author and include up to 6 keywords from the above list of topics and an abstract of no more than 400 words. The full manuscript should be at most 8 pages using the two-column IEEE format. Additional pages will be charged at additional fee. Please include page numbers on all submissions to make it easier for reviewers to provide helpful comments. Submit a PDF copy of your full manuscript via email to the special session organizers at xidianzzy-AT-yahoo.cn and peiqingqi-AT-gmail.com .
Only PDF files will be accepted. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, technical clarity and presentation. Authors of accepted papers must guarantee that their papers will be registered and presented at the special session. Accepted papers will be published in the conference proceedings which will be made available at the time of the meeting.
Submission of a paper implies that should the paper be accepted, at least one of the authors will register for the HPCS conference and present the paper in the workshop. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.
All accepted papers are expected to be published as ISBN proceedings by the IEEE and will be available online through IEEE Digital Library ( EI indexing ).
IMPORTANT DATES
Extension Paper Submissions: February 28, 2010
Acceptance Notification: March 20, 2010
Camera Ready Papers and Registration Due: April 15, 2010
SPECIAL SESSION ORGANIZER(S)
Dr. Zhiyong ZHANG
Cultural Property Preservation & Digitization Research Center,
Henan University of Science & Technology
No. 48, Rd. Xiyuan
Luoyang, P. R. of China
Phone: +86 379 64231910
Fax: +86 379 64231910
Email: xidianzzy-AT-yahoo.cn
Homepage: http://cnis-xd.com/~zyzhang/
Assoc. Prof. Qingqi PEI
Chinese Ministry of Education Key Laboratory of Computer Network & Information Security,
Xidian University
No. 2, South Rd. Taibai
Xi\'an, P. R. of China
Phone: +86 29 88202859
Fax: +86 29 88202859
Email: peiqingqi-AT-gmail.com
If you have any questions about paper submission or the special session, please contact the Special Session organizers at the above addresses.
If you have any questions about conference paper submission, please contact Conference Program Chair: Waleed W. Smari, University of Dayton, 300 College Park, Dayton, OH 45469-0226, USA, Voice: (937) 681-0098, Fax: (937) 255-4511, Email: smari-AT-arys.org . For information about the HPCS conference in general, please contact the General Chairs or consult the conference web site at http://cisedu.us/cis/hpcs/10/main/callForPapers.js... .
CALL FOR PAPERS
As part of
The International Conference on High Performance Computing & Simulation (HPCS 2010)
http://cisedu.us/cis/hpcs/10/main/callForPapers.js...
In conjunction with
The 6th International Wireless Communications and Mobile Computing Conference (IWCMC 2010)
Extension Submission Deadline: February 28, 2010
SCOPE AND OBJECTIVES
Recent years have witnessed rapid developments of the information communication technology and the Next-Generation Internet. 3G and 4G wireless mobile networks have been striding to a large-scale deployment and application. So, we have seen the potential and value for new technologies from a variety of digital networks to various interconnected digital devices, which made it possible to realize the ubiquitous network and society.
The ubiquitous network could enable a convenient connection ýanytime, anywhere, anything, anyoneý to the information communications network. Yet, it is necessary for users to establish a highly secure and reliable environment in which they could enjoy ubiquitous digital services via ubiquitous network and connectivity. Establishing trustworthy ubiquitous network brings up some urgent and challenging issues.
In contrast to the cyberspace we have seen until now, the ubiquitous network will be capable of exchanging information more freely beyond the boundaries of time and distance. Unfortunately, in such environment, copyright infringement behaviors, such as illicit copying, malicious distribution, unauthorized usage, free sharing of copyright-protected digital contents, will also become a much more common phenomenon. Contents protection & Digital Rights Management (DRM) have a tangible goal to safeguard the rights and benefits of multimedia contents owners, copyrights holders, digital services providers, and even consumers in contents value chain. Some applications research frontiers, related to contents security, have emerged in recent years. These include subjects on trustworthy networks and transactions, secure digital multimedia broadcasting and controlled contents sharing. Researchers, contents industry engineers and administrators attempt to resort to the state-of-the-art technologies and ideas to protect valuable digital contents and services assets against attacks and IP piracy in the emerging ubiquitous network.
This special session aims to bring together related research works in the realm of Ubiquitous Network and Multimedia Contents Security, and further investigates and discusses trusted solutions and secure techniques for Ubiquitous Network and Ubiquitous Computing, as well as some open issues faced by digital contents owners/rights holders/multimedia services providers, who dedicate themselves to protect their Intellectual Property Rights and business benefits. In addition, novel ideas and research works from end consumersý perspective, such as privacy, trustworthiness and multimedia contents sharing in ubiquitous network society, will be embraced by the session.
The Session topics include (but are not limited to) the following:
* Digital Rights Management & Interoperability
* Methodologies for Establishing Trust Among Unknown/Un-trusted Entities
* Authentication, Authorization and Access Control in Ubiquitous Networks
* Metrics and Measurement Schemes
* Monitoring and Assessment
* IP, Privacy and Trust in Ubiquitous Networks
* Ubiquitous Computing & Web Services
* Secure Digital Multimedia Broadcasting
* Multimedia Contents Sharing & Risk Management
* Contents Security & Protection
PAPER SUBMISSIONS
You are invited to submit original and unpublished research works on above and other topics related to trusted ubiquitous networks and multimedia contents protection. Submitted papers must not have been published or simultaneously submitted elsewhere. Submission should include a cover page with authors\' names, affiliation addresses, fax numbers, phone numbers, and email addresses. Please, indicate clearly the corresponding author and include up to 6 keywords from the above list of topics and an abstract of no more than 400 words. The full manuscript should be at most 8 pages using the two-column IEEE format. Additional pages will be charged at additional fee. Please include page numbers on all submissions to make it easier for reviewers to provide helpful comments. Submit a PDF copy of your full manuscript via email to the special session organizers at xidianzzy-AT-yahoo.cn and peiqingqi-AT-gmail.com .
Only PDF files will be accepted. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, technical clarity and presentation. Authors of accepted papers must guarantee that their papers will be registered and presented at the special session. Accepted papers will be published in the conference proceedings which will be made available at the time of the meeting.
Submission of a paper implies that should the paper be accepted, at least one of the authors will register for the HPCS conference and present the paper in the workshop. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.
All accepted papers are expected to be published as ISBN proceedings by the IEEE and will be available online through IEEE Digital Library ( EI indexing ).
IMPORTANT DATES
Extension Paper Submissions: February 28, 2010
Acceptance Notification: March 20, 2010
Camera Ready Papers and Registration Due: April 15, 2010
SPECIAL SESSION ORGANIZER(S)
Dr. Zhiyong ZHANG
Cultural Property Preservation & Digitization Research Center,
Henan University of Science & Technology
No. 48, Rd. Xiyuan
Luoyang, P. R. of China
Phone: +86 379 64231910
Fax: +86 379 64231910
Email: xidianzzy-AT-yahoo.cn
Homepage: http://cnis-xd.com/~zyzhang/
Assoc. Prof. Qingqi PEI
Chinese Ministry of Education Key Laboratory of Computer Network & Information Security,
Xidian University
No. 2, South Rd. Taibai
Xi\'an, P. R. of China
Phone: +86 29 88202859
Fax: +86 29 88202859
Email: peiqingqi-AT-gmail.com
If you have any questions about paper submission or the special session, please contact the Special Session organizers at the above addresses.
If you have any questions about conference paper submission, please contact Conference Program Chair: Waleed W. Smari, University of Dayton, 300 College Park, Dayton, OH 45469-0226, USA, Voice: (937) 681-0098, Fax: (937) 255-4511, Email: smari-AT-arys.org . For information about the HPCS conference in general, please contact the General Chairs or consult the conference web site at http://cisedu.us/cis/hpcs/10/main/callForPapers.js... .
Other CFPs
- MRSS 6th International Remote Sensing & GIS Conference and Exhibition
- The International workshop on Mechanic Automation and Control Engineering (MACE2010)
- The 6th International Workshop on Mobile Commerce and Services (WMCS2010)
- International Conference on Information Society (i-Society 2010)
- IADIS INTERNATIONAL CONFERENCE E-SOCIETY 2010
Last modified: 2010-06-04 19:32:22