ICITST 2011 - The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)
Topics/Call fo Papers
The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011) is Technical Co-sponsored by IEEE Communications Chapter. The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2011 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.
The topics in ICITST-2011 include but are not confined to the following areas:
Application of Agents
Application Security
Artificial Intelligence and Expert Systems
Authentication and Access Control for Data Protection in Ubi-com
Blended Internet Security Methods
Biometrics
Boundary Issues of Internet Security
Broadband access technologies
Case Studies on Data Management, Monitoring and Analysis
Challenges of Content Authoring
Cloud Computing
Context-Awareness and its Data Mining for Ubi-com Service
Cyber Security
Database Protection for Ubi-com
Data Exchange issues and Supply Chain
Data Grids
Data and Information Quality Management
Digital Libraries
Data Life Cycle in Products and Processes
Database Management
Data Mining
Data Models for Production Systems and Services
Defence Systems
Distributed Information Systems
E-Learning, e-Commerce, e-Business and e-Government
Embedded Systems
E-society
Globalisation of Information Society
Government, and Corporate Internet Security Policy
Hardware and Software
Human-Computer Interface and Interaction for Ubi-com
Infonomics
Information visualization
Information Content Security
Information Management
Information Retrieval
Information Quality
Internet Architecture
Interoperability
Intelligent Multimedia Service and its Data management for Ubi-com
IPSec Quality of Services
Knowledge Management
Mobile, Ad Hoc and Sensor Network Security
Mobile Data Management
Multimedia Information Systems
Multimedia Security in Ubi-com
Natural Language Processing
Network Security Issues, Protocols, Data Security in Ubi-com
New novel Mechanism and Applications for Ubi-com
Patentability
Peer to Peer Data Management
Privacy Protection and Forensic in Ubi-com
Quality of Service Issues
Regulation, Self-Regulation, and Co-Regulation
Secured Database Systems
Security in Data Mining
Security and Access Control
Semantic Web and Ontology
Service, Security and its Data management for U-commerce
Smart Homes and its Business Model for Ubi-com Service
Software Architecture
System Design and Verification
Synchronising e-Security
Technology-Enabled Information
Temporal and Spatial Databases
Trust, Privacy, and Data Security
Ubiquitous Systems
USN / RF-ID for Ubi-com Service
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0
Web Services
Wireless Transactions
XML and Other Extensible Languages
Panel Discussion
Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.
Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.
The proposal must include:
? Title
? Panel Chair(s) (if necessary)
? Speakers Name, Affiliation and Email
? Scope
? Objective and motivation
The ICITST-2011 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before August 31, 2011. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).
All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the ICITST-2011, please email your proposal to the pandis-AT-icitst.org. Submissions should be in MS Word format.
All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewe
The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2011 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.
The topics in ICITST-2011 include but are not confined to the following areas:
Application of Agents
Application Security
Artificial Intelligence and Expert Systems
Authentication and Access Control for Data Protection in Ubi-com
Blended Internet Security Methods
Biometrics
Boundary Issues of Internet Security
Broadband access technologies
Case Studies on Data Management, Monitoring and Analysis
Challenges of Content Authoring
Cloud Computing
Context-Awareness and its Data Mining for Ubi-com Service
Cyber Security
Database Protection for Ubi-com
Data Exchange issues and Supply Chain
Data Grids
Data and Information Quality Management
Digital Libraries
Data Life Cycle in Products and Processes
Database Management
Data Mining
Data Models for Production Systems and Services
Defence Systems
Distributed Information Systems
E-Learning, e-Commerce, e-Business and e-Government
Embedded Systems
E-society
Globalisation of Information Society
Government, and Corporate Internet Security Policy
Hardware and Software
Human-Computer Interface and Interaction for Ubi-com
Infonomics
Information visualization
Information Content Security
Information Management
Information Retrieval
Information Quality
Internet Architecture
Interoperability
Intelligent Multimedia Service and its Data management for Ubi-com
IPSec Quality of Services
Knowledge Management
Mobile, Ad Hoc and Sensor Network Security
Mobile Data Management
Multimedia Information Systems
Multimedia Security in Ubi-com
Natural Language Processing
Network Security Issues, Protocols, Data Security in Ubi-com
New novel Mechanism and Applications for Ubi-com
Patentability
Peer to Peer Data Management
Privacy Protection and Forensic in Ubi-com
Quality of Service Issues
Regulation, Self-Regulation, and Co-Regulation
Secured Database Systems
Security in Data Mining
Security and Access Control
Semantic Web and Ontology
Service, Security and its Data management for U-commerce
Smart Homes and its Business Model for Ubi-com Service
Software Architecture
System Design and Verification
Synchronising e-Security
Technology-Enabled Information
Temporal and Spatial Databases
Trust, Privacy, and Data Security
Ubiquitous Systems
USN / RF-ID for Ubi-com Service
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0
Web Services
Wireless Transactions
XML and Other Extensible Languages
Panel Discussion
Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.
Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.
The proposal must include:
? Title
? Panel Chair(s) (if necessary)
? Speakers Name, Affiliation and Email
? Scope
? Objective and motivation
The ICITST-2011 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before August 31, 2011. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).
All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the ICITST-2011, please email your proposal to the pandis-AT-icitst.org. Submissions should be in MS Word format.
All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewe
Other CFPs
- ICGST International Conference on Artificial Intelligence and Machine Learning (AIML-11)
- Journal of Universal Computer Science- Special Issue on Distributed Development of Information System
- The 2nd International Conference on Test and Measurement (ICTM 2010)
- TELSIKS 2011 - 2011 10th International Conference on Telecommunication in Modern Satellite, Cable and Broadcasting Services
- The first International Conference on ICT Convergence (ICTC 2010)
Last modified: 2010-09-27 10:44:55