| |||||||||||||||
ICITST 2011 : 6th International Conference for Internet Technology and Secured TransactionsConference Series : International Conference for Internet Technology and Secured Transactions | |||||||||||||||
Link: http://www.icitst.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011) is Technical Co-sponsored by IEEE UAE Computer Chapter. The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2011 invites research papers that encompass conceptual analysis, design implementation and performance evaluation. All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP. The topics in ICITST-2011 include but are not confined to the following areas: Application of Agents Application Security Artificial Intelligence and Expert Systems Authentication and Access Control for Data Protection in Ubi-com Blended Internet Security Methods Biometrics Boundary Issues of Internet Security Broadband access technologies Case Studies on Data Management, Monitoring and Analysis Challenges of Content Authoring Chaos-based Data Security Cloud Computing Context-Awareness and its Data Mining for Ubi-com Service Cyber Security Database Protection for Ubi-com Data Exchange issues and Supply Chain Data Grids Data and Information Quality Management Digital Libraries Data Life Cycle in Products and Processes Database Management Data Mining Data Models for Production Systems and Services Defence Systems Distributed Information Systems E-Learning, e-Commerce, e-Business and e-Government Embedded Systems E-society Globalisation of Information Society Government, and Corporate Internet Security Policy Hardware and Software Human-Computer Interface and Interaction for Ubi-com Infonomics Information visualization Information Content Security Information Management Information Retrieval Information Quality Internet Architecture Interoperability Intelligent Multimedia Service and its Data management for Ubi-com IPSec Quality of Services Knowledge Management Mobile, Ad Hoc and Sensor Network Security Mobile Data Management Multimedia Information Systems Multimedia Security in Ubi-com Natural Language Processing Network Security Issues, Protocols, Data Security in Ubi-com New novel Mechanism and Applications for Ubi-com Patentability Peer to Peer Data Management Privacy Protection and Forensic in Ubi-com Quality of Service Issues Regulation, Self-Regulation, and Co-Regulation Secured Database Systems Security in Data Mining Security and Access Control Semantic Web and Ontology Service, Security and its Data management for U-commerce Smart Homes and its Business Model for Ubi-com Service Social Informatics Software Architecture System Design and Verification Synchronising e-Security Technology-Enabled Information Temporal and Spatial Databases Trust, Privacy, and Data Security Ubiquitous Systems USN / RF-ID for Ubi-com Service Web Databases Web Metrics and its Applications Web Mining including Web Intelligence and Web 3.0 Web Services Wireless Transactions XML and Other Extensible Languages |
|