ICITST 2014 - The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)
Date2014-12-08 - 2014-12-10
Deadline2014-06-30
VenueLondon, UK - United Kingdom
Keywords
Websitehttps://www.icitst.org
Topics/Call fo Papers
The International Conference for Internet Technology and Secured Transactions (ICITST-2014) is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2014 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
The topics in ICITST-2014 include but are not confined to the following areas:
Internet Application and Technology
Internet technologies
Internet Architecture
Internet of things
Broadband Access Technologies
Application Agents
Boundary Issues of Internet Security
Database Management
Data Models for Production Systems and Services
Artificial Intelligence and Expert Systems
IPSec Quality of Service
Knowledge Management
Embedded Systems
Defence Systems
Infonomics and e-Technology
Infonomics
Information Visualization
Information Management
Information Quality
Technology-Enabled Information
e-Learning
e-Commerce
e-Business
e-Government
e-Society
System Design and Security for e-Services
Synchronizing e-Security
Cyber warfare and Cyber Security
Surveillance Systems
Cyber Warfare Trends and Approaches
Social engineering
Template Protection and Liveliness detection
New theories and algorithms in biometrics
Formal Methods Application in Security
Operating Systems and Database Security
nterprise Systems Security
SCADA and Embedded systems security
Distributed and Pervasive Systems Security
Secure Software Development
Information Security
Collaborative Learning
Trust, Privacy and Data Security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Cryptography
Secure Communications
Authentication Techniques
Chaos-based Data Security
MANET Security
Wireless Sensor Network Security
Organization Considerations in Security Policy Formulation and Implementations
Digital Forensics and Crimes
Biometrics
Cyber Security
Multimedia and Web Services
Intelligent Multimedia and its Data Management
Multimedia Information Systems
Multimedia Security
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0.
Web Services
XML and other extensible languages
Semantic Web and Ontology
Digital Forensic
Data leakage and Database forensics
Forensics of Virtual and Cloud Environments
Network Forensics and Traffic Analysis
Information Hiding
File System and Memory Analysis
Executable Content and Content Filtering
Anti-Forensics Techniques
Malware forensics
Evidentiary Aspects of Digital Forensics
Large-Scale Investigations
New threats and Non-Traditional approaches
Incident Handling and Penetration Testing
Ubi/Cloud Computing
Authentication and Access Control for Data Protection in Ubi/Cloud Computing
Context-Awareness and its Data Mining for UbiCom
Data Grids
Distributed Information Systems
Human-Computer Interface and Interaction for UbiCom
Ubiquitous Systems
USN/RFID Service
Smart Homes and its Business Model for UbiCom Service
Security and Data Management for UbiCom
Peer to Peer Data Management
New Novel Mechanism and Application for Ubi/Cloud Computing
Cloud Security
Secure Virtual Infrastructure and Private Cloud
Cryptographic Enforcement of Multi-Tenancy
Cloud Requirements for PaaS and SaaS
Security Policy and Privacy Requirements
CloudAudit Protocol
Corporate Governance
Laws and Regulations
Threats, Vulnerabilities, and Risk Management
Disaster Recovery Planning
Critical Infrastructure Protection
Digital Rights Management
Security Policies and Trust Management
Identity Management
Decidability and Complexity
Economics of Security
Fraud Management
Research in Progress
Ongoing research from undergraduates, graduates/postgraduates and professionals
Collaborative Research
Future Technologies
The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2014 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
The topics in ICITST-2014 include but are not confined to the following areas:
Internet Application and Technology
Internet technologies
Internet Architecture
Internet of things
Broadband Access Technologies
Application Agents
Boundary Issues of Internet Security
Database Management
Data Models for Production Systems and Services
Artificial Intelligence and Expert Systems
IPSec Quality of Service
Knowledge Management
Embedded Systems
Defence Systems
Infonomics and e-Technology
Infonomics
Information Visualization
Information Management
Information Quality
Technology-Enabled Information
e-Learning
e-Commerce
e-Business
e-Government
e-Society
System Design and Security for e-Services
Synchronizing e-Security
Cyber warfare and Cyber Security
Surveillance Systems
Cyber Warfare Trends and Approaches
Social engineering
Template Protection and Liveliness detection
New theories and algorithms in biometrics
Formal Methods Application in Security
Operating Systems and Database Security
nterprise Systems Security
SCADA and Embedded systems security
Distributed and Pervasive Systems Security
Secure Software Development
Information Security
Collaborative Learning
Trust, Privacy and Data Security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Cryptography
Secure Communications
Authentication Techniques
Chaos-based Data Security
MANET Security
Wireless Sensor Network Security
Organization Considerations in Security Policy Formulation and Implementations
Digital Forensics and Crimes
Biometrics
Cyber Security
Multimedia and Web Services
Intelligent Multimedia and its Data Management
Multimedia Information Systems
Multimedia Security
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0.
Web Services
XML and other extensible languages
Semantic Web and Ontology
Digital Forensic
Data leakage and Database forensics
Forensics of Virtual and Cloud Environments
Network Forensics and Traffic Analysis
Information Hiding
File System and Memory Analysis
Executable Content and Content Filtering
Anti-Forensics Techniques
Malware forensics
Evidentiary Aspects of Digital Forensics
Large-Scale Investigations
New threats and Non-Traditional approaches
Incident Handling and Penetration Testing
Ubi/Cloud Computing
Authentication and Access Control for Data Protection in Ubi/Cloud Computing
Context-Awareness and its Data Mining for UbiCom
Data Grids
Distributed Information Systems
Human-Computer Interface and Interaction for UbiCom
Ubiquitous Systems
USN/RFID Service
Smart Homes and its Business Model for UbiCom Service
Security and Data Management for UbiCom
Peer to Peer Data Management
New Novel Mechanism and Application for Ubi/Cloud Computing
Cloud Security
Secure Virtual Infrastructure and Private Cloud
Cryptographic Enforcement of Multi-Tenancy
Cloud Requirements for PaaS and SaaS
Security Policy and Privacy Requirements
CloudAudit Protocol
Corporate Governance
Laws and Regulations
Threats, Vulnerabilities, and Risk Management
Disaster Recovery Planning
Critical Infrastructure Protection
Digital Rights Management
Security Policies and Trust Management
Identity Management
Decidability and Complexity
Economics of Security
Fraud Management
Research in Progress
Ongoing research from undergraduates, graduates/postgraduates and professionals
Collaborative Research
Future Technologies
Other CFPs
Last modified: 2014-01-31 21:52:00