posted by user: 743zh2k || 2805 views || tracked by 4 users: [display]

IWCS 2011 : The 1st FTRA International Workshop on Convergence Security in Pervasive Environments

FacebookTwitterLinkedInGoogle

Link: http://www.ftrai.org/iwcs2011/
 
When Jun 28, 2011 - Jun 30, 2011
Where Crete, Greece
Submission Deadline Jan 31, 2011
Notification Due Mar 1, 2011
Final Version Due Apr 1, 2011
 

Call For Papers

[IWCS 2011 Call for Papers]

===============================================================================
** Important Notices **

1. Submission due: Jan. 31, 2011

2. All accepted papers will bepublished in the Springer LNCS/CCIS proceedings (EI and ISTP),
which will be indexed by the following services: EI Compendex(Since 2010),
ISI Conference Proceedings Citation Index - Science (CPCI-S),
included in ISI Web of Science, DBLP and Scopus.

3. All accepted and presented papers in IWCS 2011, after further revisions,
will be published in the special issues of the following international journals:

- IJDWM, IGI-Gobal (SCI-E), http://www.igi-global.com/ijdwm
- The Computer Jorunal, Oxford University Press (SCI-E), http://comjnl.oxfordjournals.org/
- SCN, Wiley InterScience (SCIE), http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122
- IJITCC, InderScience, http://www.inderscience.com/ijitcc
- JoC, FTRA Publishing, http://www.ftrai.org/joc
- JIPS, KIPS (KCI-E index) http://jips-k.org

===============================================================================

The 1st FTRA International Workshop on Convergence Security in
Pervasive Environments (IWCS 2011)

Crete, Greece, June 28 - 30, 2011

http://www.ftrai.org/iwcs2011

===============================================================================

Overview
--------------------------------------
A recent emerging issue in information technology is the convergence of different kinds of applications. Convergence brings a user-centric environment to provide computing and communication services. In order to realize IT advantages, it requires the integration of security and data management to be suitable for pervasive computing environments. However, there are still many problems and major challenges waiting for us to solve such as the security risks in convergence application, which could appear when devices interact with different kinds of applications. Therefore, we need to explore convergence security in pervasive environments.

IWCS 2011 addresses the various theories and practical applications of convergence security in pervasive environments. It will present important results of significant value in order to improve application services and solve various problems within the scope of IWCS 2011. In addition, we expect it will trigger further related research and technology developments that will improve our lives in the future.

Another area that must be considered in the convergence of different security services in pervasive environments is the Internet of Things (IoT). There are many definitions of the IoT, but all of them revolve around the same central concept: a world-wide network of interconnected objects. It is to be expected that the elements of a pervasive environment will greatly benefit from Internet connectivity, as pervasive devices will be able to interact with external entities by obtaining services or even by providing them. However, it is necessary to address how the different security mechanisms used in the local pervasive environment could interact with protocols and mechanisms (e.g. secure web services) that allow secure collaboration with remote entities. Considering that the security of the IoT is a topic that is currently being considered a priority by many different industrial, commercial and governmental actors, the secure convergence of this new paradigm with pervasive environments is a potential research field that will be taken into account in our workshop.

Topic of Interest
-----------------------------------------
- Trust and Reputation Management in Pervasive Computing
- Security Applications and Services in Pervasive Computing
- Security Model for Pervasive Computing
- Intelligent Multimedia Security Services in Pervasive Computing
- Key Management and Authentication in Pervasive Computing
- Network Security Issues and Protocols in Pervasive Computing
- Access Control and Privacy Protection in Pervasive Computing
- Security Standard for Next Pervasive Computing
- Security in Human Centred Environments
- Natural Interfaces Security Issues
- Advanced Multimodal Interfaces
- Human Oriented Interfaces
- Multimodal Mobile and Ubiquitous Services
- Methods for Multimodal Integration
- Middleware Services for Multimodal and Pervasive Applications
- Context-Awareness in Multimodal Applications
- Multimodal Analysis and Recognition of Contex
- Next Ubiquitous and Immersive Environments
- Virtual Reality and Ubiquitous Computing
- Usability and Accessibility in Ubiquitous Applications
- Applications and Scenarios
- Wireless Applications
- Pervasive Computing Applications
- Wireless Multimedia Applications
- Others: Commercial or Industrial Issue in Pervasive Computing
- Secure collaboration between pervasive environments through the Internet
- Protecting the integration of pervasive environment with the Internet of Things


Paper Submission
-----------------------------------------
There will be a combination of presentations including scientific papers. Prospective authors are invited, in the first instance, to submit papers for oral presentations in any of the areas of interest for this workshop.
Authors should submit a paper with 4-6 pages in length(Max. 8 pages, extra charges for two pages) by using online systems for review.

All accepted papers will be published in the Springer CCIS proceedings (EI and ISTP), which will be indexed by the following services:

EI Compendex(Since 2010), ISI Conference Proceedings Citation Index - Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus.

For more detail, please refer STA 2011 site (URL: http://www.ftrai.org/sta2011/Proceedings.html)

Submission URL: http://www.editorialsystem.net/iwcs2011



Important Dates
-----------------------------------------
Paper Submission Deadline: Jan. 31, 2010
Paper Status Notification: Mar. 1, 2011
Camera-ready Due: April 1, 2011
Conference events: June 28 - 30, 2011


Contact
-----------------------------------------
If you have any questions about the CFPs and papers submission, please email to
Prof. Jose A. Onieva (onieva@lcc.uma.es) and
Dr. Kyusuk Han (hankyusuk@kaist.ac.kr).


==General Chairs==
Jose A. Onieva, University of Malaga, Spain
Charalabos Skianis, University of Aegean, Greece

==Program Chairs==
Kyusuk Han, KAIST, Korea
Rodrigo Roman Castro, University of Malaga, Spain

==Publicity Co-chairs==
Christos Xenakis, University of Piraeus, Greece
Eleni Darra, University of Piraeus, Greece
Evangelos Rekleitis, University of Piraeus, Greece

==Program Committee==
Alexander De Luca, Ludwig-Maximilians-Universitat, Germany
Anthony H.M. Chung, University of Lancaster, UK
Antonio Jara, University of Murcia, Spain
Chan Yeun Yeob, Khalifa University of Science Technology and Research, UAE
Damien Sauveron, XLIM, University of Limoges, France
Deok Gyu Lee, ETRI, Korea
Fabio Martinelli, Information Security Group, IIT-CNR, Italy
Florian Michahelles, ETH Zurich, Switzerland
Florina Almen찼rez, University Carlos III of Madrid, Spain
Han-You Jeong, Pusan University, Korea
Hyohyun Choi, Inha Technical College, Korea
Isaac Agudo, Universidad de Malaga, Spain
Jae-il Lee, KISA, Korea
Javier Lopez, Computer Science Department, University of Malaga, Spain
Jeong Hyun Yi, Soongsil University, Korea
Jongsub Moon, Korea University, Korea
Jordi Herrera Joancomarti Open University of Catalonia, Spain
Jose A. Montes Universidad de M찼laga, Spain
Levente Buttyan BME, Hungary
Magdalena Payeras-Capella University of the Balearic Islands, Spain
Manik Lal Das Dhirubhai Ambani Inst. for Information and Communication Tech., India
Marc Lacoste France Telecom R&D/Orange Labs, France
Mar챠a Francisca Hinarejos University of the Balearic Islands, Spain
Mark Billinghurst Univ. of Canterbury, New Zealand
Masoom Alam Institute of Management Sciences(Assistant Professor),Pakistan
Miguel Soriano Universitat Politecnica de Catalunya, Spain
Nicolas Sklavos Tech. Educational Institute of Patras, Greece
Olivier Markowitch ULB, Belgium
Panagiotis Rizomiliotis University of the Aegean, Greece
Pierangela Samarati Department of Information Technologies, University of Milan, Italy
Rodrigo Roman Castro University of Malaga, Spain
Ruben Rios del Pozo University of Malaga, Spain
Sokratis Katsikas Dept. of Technology Education & Digital Systems, University of Piraeus, Greece
Stefanos Gritzalis Info-Sec-Lab, University of the Aegean, Greece
Sunwoong Choi Kookmin University, Korea
Thomas Strang, German Aerospace Center (DLR), Germany
Thomas Wook Choi, Hankuk University of Foreign Studies, Korea
Won Joo Lee, Inha Technical College, Korea
Yong Lee, ChungJu University, Korea

Related Resources

PERSUASIVE 2025   20th International Conference on Persuasive Technology
PERSUASIVE 2025   20th International Conference on Persuasive Technology
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
Call For Papers Special Issue 2024   Smart Cities, innovating in the Transformation of Urban Environments
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
SECRYPT 2025   22nd International Conference on Security and Cryptography
IITUPC 2024   Immunotherapy and Information Technology: Unleashing the Power of Convergence