posted by system || 6501 views || tracked by 7 users: [display]

UCSI 2011 : The Second International Workshop on Ubiquitous Computing Security Issues

FacebookTwitterLinkedInGoogle

Link: http://www.comp.dit.ie/ucsi-2011
 
When Dec 12, 2011 - Dec 13, 2011
Where Abu Dhabi, UAE
Submission Deadline Aug 26, 2011
Categories    ubiquitous computing   security
 

Call For Papers

The Second International Workshop on Ubiquitous Computing Security Issues (UCSI'11)
http://www.comp.dit.ie/ucsi-2011/

In conjunction with the
6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)
December 11-14, 2011, Abu Dhabi, UAE
Hosted by Khalifa University
http://www.icitst.org/


Workshop Summary
================
In the last few years we have witnessed a significant increase in the use of computers and mobile devices in Ubiquitous
Computing Systems. While this is a welcome trend, security concerns are becoming one of the major problems. It is affecting
the adoption rate and usage of these systems. Unless deliberate efforts are taken to secure these systems from design to
implementation most of the development achieved to date may not be realised and rolled out to the real world.

The Ubiquitous Computing Security Issues (UCSI) workshop will bring together researchers and industry participants who are
involved with the design, development, and implementation of novel applications and frameworks in the domain of Ubiquitous
Computing. The UCSI workshop will provide a high profile, leading edge forum for researchers and engineers alike to present
state-of-the-art research in the field of security for Ubiquitous Computing.

The UCSI workshop invites original, high-quality research contributions. In particular contributions that identify the
state-of-the-art in the design, development, deployment, evaluation and understanding of security issues for Ubiquitous
Computing systems.


Topics of Interest
==================
) Security Challenges in Ubiquitous Computing Systems
) Issues and Challenges of Ubiquitous Computing in e-Healthcare
) Security and Privacy Concerns in Ubiquitous Computing Systems
) Security Concerns in Positioning and Tracking Technologies
) Privacy Concerns in Context-Aware Systems and Smart Environments
) Techniques and Challenges for Implementing Secure Smart Environments
) Legal and Ethical Issues relating to Ubiquitous Computing Systems
) Security of FLOSS
) Measuring software reliability issues
) Mobile, Ad Hoc and Sensor Network Security
) Network Security Issues, Protocols, Data Security in Ubi-com
) Secure communications
) Secured Database Systems
) Security in Data Mining
) Security and Access Control
) Security of Web-based applications and services
) Service, Security and its Data management for U-commerce

Important Dates
===============
Paper Submission: August 26, 2011
Authors Notification: September 30, 2011
Final Paper Submission: October 14, 2011
Early Registration Deadline (Authors only): May 31 to September 30, 2011
Late Registration Deadline (Authors only): October 01 to November 15, 2011
Participants Registration: May 31 to December 01, 2011
Workshop Dates: December 12-13, 2011

Submission Details
==================
Paper must be submitted electronically to george.oreku@gmail.com. All papers will be fully refereed by at least two referees and
before final acceptance all referees? comments must be considered. The required formats of the paper are available on the conference
Website http://www.icitst.org/Paper%20Submission.html.

Workshop Committees
===================
Program Co-Chairs
------------------
George S. Oreku, TIRDO/North West University, South Africa
Fredrick J. Mtenzi, Dublin Institute of Technology, Ireland

Program Committee
------------------
Mike Jackson, Birmingham City University, UK
Sulayman K. Sowe, United Nations University Institute for Advanced Studies (UNU-IAS) Japan.
Imed Hammouda. Tampere University of Technology, Finland
Dennis Lupiana, Dublin Institute of Technology, Ireland
Ali Al-Dahoud, Al-Zaytoonah University, Jordan
Victor Kimutai Kimeli, Moi University, Kenya
Qaisar Rasool, Bahauddin Zakariya University. Pakistan
Ciaran O'Driscoll, Dublin Institute of Technology, Ireland
Tamara Pazynyuk. Joint Stock Company (JSC)/ Far East Energy Management Company (FEEMC), Russia
Edward Mutafungwa, Aalto University, Finland
Danish Irfan, COMSATS, Institute of Information Technology, Pakistan
Jameson Mbale, University of Namibia, Namibia
Abid Khan, COMSATS, Institute of Information Technology, Pakistan
Laurence T. Yang, St. Francis Xavier University, Canada
Zanifa Omary, Dublin Institute of Technology, Ireland
Ion Tutanescu, University of Pitesti, Romania
Juanita Fernando, Monash University, Australia
Kudakwashe Dube, Hamilton University, New Zealand

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
UBICOMM 2025   The Nineteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
Intelligent Computing-Based Time Series 2025   Intelligent Computing: Special Issue: Intelligent Computing-Based Time Series Analysis for Cybersecurity
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
FSTJ 2024   Food Science and Technology: An International Journal
ICCBDC--EI 2025   2025 the 9th International Conference on Cloud and Big Data Computing (ICCBDC 2025)
COIT 2025   5th International Conference on Computing and Information Technology