| |||||||||||||||
UC-Sec 2009 : The 2009 International Workshop on Ubiquitous Computing Security | |||||||||||||||
Link: http://www.sersc.org/UCSEC2009 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 2009 International Workshop on
Ubiquitous Computing Security (UC-Sec 09) http://www.sersc.org/UCSEC2009 July 13-16, 2009, Las Vegas, USA In Conjunction with SAM'09 / WORLDCOMP'09 The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing =========================================================== Overview ------------ Ubiquitous Computing (UC) paradigm foresees seamless integration of communicating and computational devices and applications embedded in all parts of life - homes, offices, school, hospital, an so on. However, there are many problems and major challenges awaiting for us to solve such as the security risks in ubiquitous resource sharing, which could be occurred when data resources are connected and accessed by anyone in UC. Therefore, security issues should be appropriately addressed in UC. UC-Sec 09 is intended to foster the dissemination of state-of-the-art research in the area of UC security technology. The main aim of UC-Sec workshop is to provide a forum for academic and industry professionals to discuss recent progress in methods and technology concerning the identification of risks, the definition of security policies, and the development of security measures for UC. In UC-Sec 09, we plan to publish high quality papers, which cover the various security issues in UC. Topics of interest include, but are not limited to: ------------ - Access control and authorization - Ad hoc and sensor network security - Advanced Cryptographic algorithms - Data privacy and trustiness - Identity management - Information hiding and DRM - Key management and authentication - Location privacy and secure localization - Malware in ubiquitous computing environments and services - Privacy, anonymity, and trust management - Privacy issues in the use of smart cards and RFID systems - Role of RFID, sensors and biometrics to enable security - Security in U-commerce and U-business and other applications - Security in P2P networks and Grid computing - Trust and reputation management - Case Studies and prototype implementation for UC-Sec Important Dates ----------------- Submission deadline: Jan. 15, 2009 Acceptance notification: Feb. 28, 2009 Camera-ready Version Due: April 1, 2009 Submission Guidelines -------------------- UC-SEC 09 invites authors to submit original and unpublished work. Please submit paper with 6 pages in IEEE Computer Society Style format. Paper submission should be electronic in only PDF format. Papers must conform to IEEE style guidelines at http://www.computer.org/portal/pages/cscps/cps/cps_forms.html Submission system: http://submission.sersc.org/UCSEC2009/ Paper Publication and Special Issues ------------------------------------- Accepted papers will appear in the SAM??09 Conference Proceedings published by CSREA Press (ISBN) in hardcopy. The proceedings will be available for distribution at the conference. Distinguished selected papers accepted and presented in UC-Sec 09 (30~60%), after further revisions, will be published in special issues of International Journals; -Computer Communications indexed by SCI-E (Elsevier), 2010 -Journal of Internet Technology indexed by SCI-E (Ministry of Education - Taiwan), 2010 -COMPUTERS & MATHEMATICS WITH APPLICATIONS indexed by SCI-E (ELSEVIER SCIENCE), 2010 -International Journal of Security and Its Applications (SERSC Press), 4th Quarter, 2009 -International Journal of Multimedia and Ubiquitous Engineering (SERSC Press), 4th Quarter 2009 Organization -------------- ==General Chair== Jong Hyuk Park, Kyungnam University, Korea Email: parkjonghyuk1@hotmail.com ==Program Co-chairs == Changhoon Lee (Korea University, Korea) Yan Zhang ,Simula Research Laboratory, Norway Liudong Xing (University of Massachsetts - Dartmouth, USA) ==Publicity Co-chairs == Deok Gyu Lee, ETRI, Korea ==Program Committee == Xiaolin (Andy) Li, Oklahoma State University, USA Xiaobo Zhou, University of Colorado at Colorado Springs, USA Zhihua Tang, TORC Financial, USA Xinwen Fu, University of Massachusetts, USA Yan Sun, University of Rhode Island, USA Wenbing Zhao, Cleveland State University, USA Li Bai, Temple University, USA Xinyuan (Frank) Wang, George Mason University, USA Alan Chin-Chen Chang, National Chung Cheng University, Taiwan Binod Vaidya, GIST, Korea BS. Koh, DigiCAPs, Korea Damien Sauveron, Universit?de Limoges/CNRS, France Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan Jemal H. Abawajy, Deakin University, Australia Ming-Yuh Huang, The Boeing Company, USA Naixue Xiong, Georgia State University, USA Nicolas Sklavos, Technological Educational Institute of Patras, Greece Ning Zhang, University of Manchester, UK Sajid Hussain, Acadia University, Canada Sang-Soo Yeo, BTWorks Inc., Korea Stefanos Gritzalis, University of the Aegean, Greece Yi Mu, University of Wollongong, Australia Chunming Rong, University of Bergen, Norway Jongsung Kim, CIST, Korea University, Korea Seokhie Hong, CIST, Korea University, Korea Taihoon Kim, Hannam University, Korea Emmanuelle Anceaume, IRISA / CNRS, France Hangbae Chang, Daejin University, Korea Vinod Vokkarane, University of Massachusetts Dartmouth, USA Donggang Liu, University of Texas at Arlington, USA Shiguo Lian, France Telecom R&D(Orange Labs), China, Fan Zhang, Huazhong University of Science and Technology, China, Rong Yu, SCUT, China Lingyang Song, Philips Research Laboratories, UK Jiming Chen, Zhejiang University, China Lei Shu, National University of Ireland, Ireland Zhang lili, Potevio institute of Technology, China ==Contact Information== If you have any question about the CfP and papers submission, please email to Prof. Jong Hyuk Park (parkjonghyuk1@hotmail.com) and Dr. Changhoon Lee (changhoonlee08@gmail.com). - The End - |
|