ICITST 2009

From Openresearch
Revision as of 22:34, 18 January 2009 by Icitst2009 (talk | contribs) (The International Conference for Internet Technology and Secured Transactions (ICITST) is co-sponsored by IEEE UK/RI Section.)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
ICITST 2009
IEEE 4th International Conference for Internet Technology and Secured Transactions
Dates 2009/11/09 (iCal) - 2009/11/12
Homepage: www.icitst.org
Location
Location: London, United Kingdom
Loading map...

Important dates
Submissions: 2009/07/17
Table of Contents


Apologies for cross-postings. Please send it to interested colleagues and students. Thanks!


CALL FOR PAPERS



The IEEE International Conference for Internet Technology and Secured Transactions 2009 (ICITST-2009)

November 9–13, 2009, London, UK (www.icitst.org)



The International Conference for Internet Technology and Secured Transactions (ICITST) is co-sponsored by IEEE UK/RI Section. The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry. The objectives of ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. ICITST 2009 invites and welcomes research papers that encompass conceptual analysis, design implementation and performance evaluation. All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP. The topics in ICITST 2009 include but are not confined to the following areas:


  • Application of agents
  • Application security
  • Blended Internet security methods
  • Biometrics
  • Boundary issues of Internet security
  • Broadband access technologies
  • Challenges of content authoring
  • Data mining security
  • E-society
  • Globalisation of information society
  • Government, and corporate Internet security policy
  • Internet architecture
  • Infonomics
  • IPSec quality of services
  • Patentability
  • Regulation, self-regulation, and co-regulation Web services
  • Secured database systems
  • Synchronising e-security
  • Technology-enabled information
  • Trust, privacy, and data security
  • Wireless transactions
  • Context-Awareness and its Data mining for Ubi-com service
  • Human-Computer Interface and Interaction for Ubi-com
  • Smart Homes and its business model for Ubi-com service
  • Intelligent Multimedia Service and its Data management for Ubi-com
  • USN / RF-ID for Ubi-com service
  • Network security issues, protocols, data security in Ubi-com
  • Database protection for Ubi-com
  • Privacy Protection and Forensic in Ubi-com
  • Multimedia Security in Ubi-com
  • Quality of Service Issues
  • Authentication and Access control for data protection in Ubi-com
  • Information visualization
  • Web services
  • Service, Security and its Data management for U-commerce
  • New novel mechanism and Applications for Ubi-com
  • Information Management
  • Multimedia Information Systems
  • Information Retrieval
  • Natural Language Processing
  • Digital Libraries
  • Data and Information Quality Management
  • Data Grids, Data and Information Quality
  • Database Management
  • Web Databases
  • Temporal and Spatial Databases
  • Data Mining
  • Web Mining including Web Intelligence and Web 3.0
  • E-Learning, eCommerce, e-Business and e-Government
  • Web Metrics and its applications
  • XML and other extensible languages
  • Semantic Web and Ontology
  • Human-Computer Interaction
  • Artificial Intelligence and Expert Systems
  • Knowledge Management
  • Ubiquitous Systems
  • Peer to Peer Data Management
  • Interoperability
  • Mobile Data Management
  • Data Models for Production Systems and Services
  • Data Exchange issues and Supply Chain
  • Data Life Cycle in Products and Processes
  • Case Studies on Data Management, Monitoring and Analysis
  • Security and Access Control
  • Information Content Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Distributed information systems


IMPORTANT DATES

Full Paper July 17, 2009 Proposal for Workshops and Tutorials April 30, 2009 Notification of Workshop Acceptance May 15, 2009 Proposal for Industrial Presentation April 30, 2009 Notification of Industrial Presentation Acceptance May 15, 2009 Notification of Paper Acceptance/Rejection September 5, 2009 Camera Ready Paper Due September 15, 2009 Author Registration October 01, 2009 Early Bird Attendee registration October 15, 2009 Conference Dates November 9-12, 2009



PROGRAM COMMITTEES

General Chairs

Godfried Williams, University of East London, UK

Ion Tutanescu, University of Pitesti, Romania


General Vice-chairs

Kevin J. Lü, Brunel University, UK

Shi-Cho Cha, National Taiwan University of Science and Technology, Taiwan, ROC


Technical Program Co-chair

Bernd Markscheffel, Technische Universität Ilmenau, Germany


International Co-chairs

Nicu Bizon, University of Pitesti, Romania

Titus Olaniyi, London South Bank University, UK


Poster and Demo Co-chair

Fred Mtenzi, Dublin Institute of Technology, Ireland


Local Arrangements Chairs

Alex Logvynovskiy, University of East London, UK

Cyril Azenabor, University of East London, UK


Research Student Forum Chair

Taiwo Ayodele, University of Portsmouth, UK


Publication Chairs

Charles A. Shoniregun, Sheridan Institute of Technology and Advanced Learning, Canada

Maaruf Ali, Oxford Brookes University, UK


Publicity and Workshop Chair

Galyna Akmayeva, Wessex Institute of Technology / University of Wales, UK


Industrial Chair

Jen-Yao Chung, IBM T. J. Watson Research Center, New York, USA


Steering Committees

Paul Hofmann, Vice President Research, SAP Labs, USA

Brendan O’Shea, Dublin Institute of Technology, Ireland

Liang-Jie (LJ) Zhang, IBM T. J. Watson Research Centre, New York, USA

Charles A. Shoniregun, Sheridan Institute of Technology and Advanced Learning, Canada

Maaruf Ali, Oxford Brookes University, UK

Dragana Martinovic, University of Windsor, Canada

Victor Ralevich, Sheridan Institute of Technology and Advanced Learning, Canada

Ali Al-Dahoud, Al-Zaytoonah University of Jordan, Jordan


TECHNICAL PROGRAM COMMITTEES Technical Program Committee members names and their affiliations are available at www.icitst.org

Facts about "ICITST 2009"
AcronymICITST 2009 +
End dateNovember 12, 2009 +
Event typeConference +
Has coordinates51° 30' 27", -0° 7' 40"Latitude: 51.507444444444
Longitude: -0.12776666666667
+
Has location cityLondon +
Has location countryCategory:United Kingdom +
Homepagehttp://www.icitst.org +
IsAEvent +
Start dateNovember 9, 2009 +
Submission deadlineJuly 17, 2009 +
TitleIEEE 4th International Conference for Internet Technology and Secured Transactions +