posted by user: pseymer || 5108 views || tracked by 4 users: [display]

UCSI 2010 : The 1st International Workshop on Ubiquitous Computing Security Issues

FacebookTwitterLinkedInGoogle

Link: http://www.comp.dit.ie/ucsi2010
 
When Nov 8, 2010 - Nov 11, 2010
Where London, United Kingdom
Submission Deadline May 31, 2010
Notification Due Jun 30, 2010
Final Version Due Jul 31, 2010
Categories    ubiquitous computing   security
 

Call For Papers

*****************************************************************************************
The 1st International Workshop on Ubiquitous Computing Security Issues (UCSI'10)
http://www.comp.dit.ie/ucsi2010/

The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010)
November 8-11, 2010, London, UK
http://www.icitst.org/Home.html
******************************************************************************************

Introduction
============
In the last few years we have witnessed a significant increase in the use of computers and mobile devices in Ubiquitous Computing Systems. While this is a welcome trend, security concerns are becoming one of the major problems. It is affecting the adoption rate and usage of these systems. Unless deliberate efforts are taken to secure these systems from design to implementation most of the development achieved to date may not be realised and rolled out to the real world.

The Ubiquitous Computing Security Issues (UCSI) workshop will bring together researchers and industry participants who are involved with the design, development, and implementation of novel applications and frameworks in the domain of Ubiquitous Computing. The UCSI workshop will provide a high profile, leading edge forum for researchers and engineers alike to present state-of-the-art research in the field of security for Ubiquitous Computing.

The UCSI workshop invites original, high-quality research contributions. In particular contributions that identify the state-of-the-art in the design, development, deployment, evaluation and understanding of security issues for Ubiquitous Computing systems.


Format and Duration
===================
The workshop is intended to take half a day. It will comprise of short presentations on the key security issues. These issues will then be open for review and discussion. At the end of the workshop a panel session will be held to sum up the major findings and contributions made during the workshop.


Topics of interest include but not limited to:
==============================================

* Security Challenges in Ubiquitous Computing Systems
* Design Principles of Secure Ubiquitous Computing Systems
* Issues and Challenges of Ubiquitous Computing in e-Healthcare
* Security and Privacy Concerns in Ubiquitous Computing Systems
* Security Concerns in Positioning and Tracking Technologies
* Privacy Concerns in Context-Aware Systems and Smart Environments
* Techniques and Challenges for Implementing Secure Smart Environments
* Legal and Ethical Issues relating to Ubiquitous Computing Systems


Important Dates
===============
Paper submission deadline: May 31, 2010
Notification of paper acceptance/rejection: June 30, 2010
Camera-ready paper submission: July 31, 2010


Submission details
==================
The UCSI workshop invites original, high-quality research contributions from researchers and practitioners from academia and industry. All are invited to submit papers limited to 6 pages in IEEE format, describing original work or a position paper. Participants will be selected based on their submissions; a selection of papers will be presented at the workshop. All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.

Authors of accepted papers will be expected to present their work at the workshop. All attendees must register for the ICITST 2010 conference - http://www.icitst.org/Registration.html.

Paper must be submitted electronically to Fredrick.Mtenzi@dit.ie . All papers will be fully refereed by at least two referees and before final acceptance all referees' comments must be considered. The required formats of the paper are available on the conference website http://www.icitst.org/Paper%20Submission.html.


Program Co-Chairs
=================
Fredrick Mtenzi, Dublin Institute of Technology, Ireland
Ciaran O'Driscoll, Dublin Institute of Technology, Ireland
Dennis Lupiana, Dublin Institute of Technology, Ireland


Program Committee
=================
Mike Jackson, Birmingham City University, UK
Kudakwashe Dube, Hamilton University, New Zealand
Laurence T. Yang, St. Francis Xavier University, Canada
Ion Tutanescu, University of Pitesti, Romania
Maaruf Ali, Oxford Brookes University, UK
Emmanuel Mkusa, Namibia University, Namibia
Tom Dowling, Claude Shannon Institute, Ireland
Ali Al-Dahoud, Al-Zaytoonah University, Jordan
Juanita Fernando, Monash University, Australia
George S. Oreku, Tanzania Industrial Research and Development Organisation, Tanzania

ENQUIRIES
=========

Dr. Fredrick Mtenzi
Fredrick.Mtenzi@dit.ie

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
UBICOMM 2025   The Nineteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
IJCSA 2024   International Journal on Computational Science & Applications
Intelligent Computing-Based Time Series 2025   Intelligent Computing: Special Issue: Intelligent Computing-Based Time Series Analysis for Cybersecurity
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICCBDC--EI 2025   2025 the 9th International Conference on Cloud and Big Data Computing (ICCBDC 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2