ICITST 2010 - The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010)
Date2010-11-08
Deadline2010-05-31
VenueLondon, UK - United Kingdom
Keywords
Websitehttps://www.icitst.org
Topics/Call fo Papers
The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010) is Technical Co-sponsored by IEEE UK/RI Communications Chapter. The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2010 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.
The topics in ICITST-2010 include but are not confined to the following areas:
Application of Agents
Application Security
Artificial Intelligence and Expert Systems
Authentication and Access Control for Data Protection in Ubi-com
Blended Internet Security Methods
Biometrics
Boundary Issues of Internet Security
Broadband access technologies
Case Studies on Data Management, Monitoring and Analysis
Challenges of Content Authoring
Context-Awareness and its Data Mining for Ubi-com Service
Database Protection for Ubi-com
Data Exchange issues and Supply Chain
Data Grids
Data and Information Quality Management
Digital Libraries
Data Life Cycle in Products and Processes
Database Management
Data Mining
Data Models for Production Systems and Services
Defence Systems
Distributed Information Systems
E-Learning, e-Commerce, e-Business and e-Government
Embedded Systems
E-society
Globalisation of Information Society
Government, and Corporate Internet Security Policy
Hardware and Software
Human-Computer Interface and Interaction for Ubi-com
Infonomics
Information visualization
Information Content Security
Information Management
Information Retrieval
Information Quality
Internet Architecture
Interoperability
Intelligent Multimedia Service and its Data management for Ubi-com
IPSec Quality of Services
Knowledge Management
Mobile, Ad Hoc and Sensor Network Security
Mobile Data Management
Multimedia Information Systems
Multimedia Security in Ubi-com
Natural Language Processing
Network Security Issues, Protocols, Data Security in Ubi-com
New novel Mechanism and Applications for Ubi-com
Patentability
Peer to Peer Data Management
Privacy Protection and Forensic in Ubi-com
Quality of Service Issues
Regulation, Self-Regulation, and Co-Regulation
Secured Database Systems
Security in Data Mining
Security and Access Control
Semantic Web and Ontology
Service, Security and its Data management for U-commerce
Smart Homes and its Business Model for Ubi-com Service
Software Architecture
System Design and Verification
Synchronising e-Security
Technology-Enabled Information
Temporal and Spatial Databases
Trust, Privacy, and Data Security
Ubiquitous Systems
USN / RF-ID for Ubi-com Service
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0
Web Services
Wireless Transactions
XML and Other Extensible Languages
The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2010 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.
The topics in ICITST-2010 include but are not confined to the following areas:
Application of Agents
Application Security
Artificial Intelligence and Expert Systems
Authentication and Access Control for Data Protection in Ubi-com
Blended Internet Security Methods
Biometrics
Boundary Issues of Internet Security
Broadband access technologies
Case Studies on Data Management, Monitoring and Analysis
Challenges of Content Authoring
Context-Awareness and its Data Mining for Ubi-com Service
Database Protection for Ubi-com
Data Exchange issues and Supply Chain
Data Grids
Data and Information Quality Management
Digital Libraries
Data Life Cycle in Products and Processes
Database Management
Data Mining
Data Models for Production Systems and Services
Defence Systems
Distributed Information Systems
E-Learning, e-Commerce, e-Business and e-Government
Embedded Systems
E-society
Globalisation of Information Society
Government, and Corporate Internet Security Policy
Hardware and Software
Human-Computer Interface and Interaction for Ubi-com
Infonomics
Information visualization
Information Content Security
Information Management
Information Retrieval
Information Quality
Internet Architecture
Interoperability
Intelligent Multimedia Service and its Data management for Ubi-com
IPSec Quality of Services
Knowledge Management
Mobile, Ad Hoc and Sensor Network Security
Mobile Data Management
Multimedia Information Systems
Multimedia Security in Ubi-com
Natural Language Processing
Network Security Issues, Protocols, Data Security in Ubi-com
New novel Mechanism and Applications for Ubi-com
Patentability
Peer to Peer Data Management
Privacy Protection and Forensic in Ubi-com
Quality of Service Issues
Regulation, Self-Regulation, and Co-Regulation
Secured Database Systems
Security in Data Mining
Security and Access Control
Semantic Web and Ontology
Service, Security and its Data management for U-commerce
Smart Homes and its Business Model for Ubi-com Service
Software Architecture
System Design and Verification
Synchronising e-Security
Technology-Enabled Information
Temporal and Spatial Databases
Trust, Privacy, and Data Security
Ubiquitous Systems
USN / RF-ID for Ubi-com Service
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0
Web Services
Wireless Transactions
XML and Other Extensible Languages
Other CFPs
- 2010 International Conference on Logistics Engineering and Management(ICLEM 2010)
- The 8th National Symposium of Search Engine and Web Mining SEWM2010
- 2010 the 10th IEEE International Conference on Signal Processing icsp10.
- The Third IET International Conference on Wireless, Mobile & Multimedia Networks ICWMMN 2010
- British Machine Vision Conference (BMVC)
Last modified: 2010-06-04 19:32:22