| |||||||||||||
IWCS 2011 : The 1st FTRA International Workshop on Convergence Security in Pervasive Environments | |||||||||||||
Link: http://www.ftrai.org/iwcs2011/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
[IWCS 2011 Call for Papers]
=============================================================================== ** Important Notices ** 1. Submission due: Jan. 31, 2011 2. All accepted papers will bepublished in the Springer LNCS/CCIS proceedings (EI and ISTP), which will be indexed by the following services: EI Compendex(Since 2010), ISI Conference Proceedings Citation Index - Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus. 3. All accepted and presented papers in IWCS 2011, after further revisions, will be published in the special issues of the following international journals: - IJDWM, IGI-Gobal (SCI-E), http://www.igi-global.com/ijdwm - The Computer Jorunal, Oxford University Press (SCI-E), http://comjnl.oxfordjournals.org/ - SCN, Wiley InterScience (SCIE), http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122 - IJITCC, InderScience, http://www.inderscience.com/ijitcc - JoC, FTRA Publishing, http://www.ftrai.org/joc - JIPS, KIPS (KCI-E index) http://jips-k.org =============================================================================== The 1st FTRA International Workshop on Convergence Security in Pervasive Environments (IWCS 2011) Crete, Greece, June 28 - 30, 2011 http://www.ftrai.org/iwcs2011 =============================================================================== Overview -------------------------------------- A recent emerging issue in information technology is the convergence of different kinds of applications. Convergence brings a user-centric environment to provide computing and communication services. In order to realize IT advantages, it requires the integration of security and data management to be suitable for pervasive computing environments. However, there are still many problems and major challenges waiting for us to solve such as the security risks in convergence application, which could appear when devices interact with different kinds of applications. Therefore, we need to explore convergence security in pervasive environments. IWCS 2011 addresses the various theories and practical applications of convergence security in pervasive environments. It will present important results of significant value in order to improve application services and solve various problems within the scope of IWCS 2011. In addition, we expect it will trigger further related research and technology developments that will improve our lives in the future. Another area that must be considered in the convergence of different security services in pervasive environments is the Internet of Things (IoT). There are many definitions of the IoT, but all of them revolve around the same central concept: a world-wide network of interconnected objects. It is to be expected that the elements of a pervasive environment will greatly benefit from Internet connectivity, as pervasive devices will be able to interact with external entities by obtaining services or even by providing them. However, it is necessary to address how the different security mechanisms used in the local pervasive environment could interact with protocols and mechanisms (e.g. secure web services) that allow secure collaboration with remote entities. Considering that the security of the IoT is a topic that is currently being considered a priority by many different industrial, commercial and governmental actors, the secure convergence of this new paradigm with pervasive environments is a potential research field that will be taken into account in our workshop. Topic of Interest ----------------------------------------- - Trust and Reputation Management in Pervasive Computing - Security Applications and Services in Pervasive Computing - Security Model for Pervasive Computing - Intelligent Multimedia Security Services in Pervasive Computing - Key Management and Authentication in Pervasive Computing - Network Security Issues and Protocols in Pervasive Computing - Access Control and Privacy Protection in Pervasive Computing - Security Standard for Next Pervasive Computing - Security in Human Centred Environments - Natural Interfaces Security Issues - Advanced Multimodal Interfaces - Human Oriented Interfaces - Multimodal Mobile and Ubiquitous Services - Methods for Multimodal Integration - Middleware Services for Multimodal and Pervasive Applications - Context-Awareness in Multimodal Applications - Multimodal Analysis and Recognition of Contex - Next Ubiquitous and Immersive Environments - Virtual Reality and Ubiquitous Computing - Usability and Accessibility in Ubiquitous Applications - Applications and Scenarios - Wireless Applications - Pervasive Computing Applications - Wireless Multimedia Applications - Others: Commercial or Industrial Issue in Pervasive Computing - Secure collaboration between pervasive environments through the Internet - Protecting the integration of pervasive environment with the Internet of Things Paper Submission ----------------------------------------- There will be a combination of presentations including scientific papers. Prospective authors are invited, in the first instance, to submit papers for oral presentations in any of the areas of interest for this workshop. Authors should submit a paper with 4-6 pages in length(Max. 8 pages, extra charges for two pages) by using online systems for review. All accepted papers will be published in the Springer CCIS proceedings (EI and ISTP), which will be indexed by the following services: EI Compendex(Since 2010), ISI Conference Proceedings Citation Index - Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus. For more detail, please refer STA 2011 site (URL: http://www.ftrai.org/sta2011/Proceedings.html) Submission URL: http://www.editorialsystem.net/iwcs2011 Important Dates ----------------------------------------- Paper Submission Deadline: Jan. 31, 2010 Paper Status Notification: Mar. 1, 2011 Camera-ready Due: April 1, 2011 Conference events: June 28 - 30, 2011 Contact ----------------------------------------- If you have any questions about the CFPs and papers submission, please email to Prof. Jose A. Onieva (onieva@lcc.uma.es) and Dr. Kyusuk Han (hankyusuk@kaist.ac.kr). ==General Chairs== Jose A. Onieva, University of Malaga, Spain Charalabos Skianis, University of Aegean, Greece ==Program Chairs== Kyusuk Han, KAIST, Korea Rodrigo Roman Castro, University of Malaga, Spain ==Publicity Co-chairs== Christos Xenakis, University of Piraeus, Greece Eleni Darra, University of Piraeus, Greece Evangelos Rekleitis, University of Piraeus, Greece ==Program Committee== Alexander De Luca, Ludwig-Maximilians-Universitat, Germany Anthony H.M. Chung, University of Lancaster, UK Antonio Jara, University of Murcia, Spain Chan Yeun Yeob, Khalifa University of Science Technology and Research, UAE Damien Sauveron, XLIM, University of Limoges, France Deok Gyu Lee, ETRI, Korea Fabio Martinelli, Information Security Group, IIT-CNR, Italy Florian Michahelles, ETH Zurich, Switzerland Florina Almen찼rez, University Carlos III of Madrid, Spain Han-You Jeong, Pusan University, Korea Hyohyun Choi, Inha Technical College, Korea Isaac Agudo, Universidad de Malaga, Spain Jae-il Lee, KISA, Korea Javier Lopez, Computer Science Department, University of Malaga, Spain Jeong Hyun Yi, Soongsil University, Korea Jongsub Moon, Korea University, Korea Jordi Herrera Joancomarti Open University of Catalonia, Spain Jose A. Montes Universidad de M찼laga, Spain Levente Buttyan BME, Hungary Magdalena Payeras-Capella University of the Balearic Islands, Spain Manik Lal Das Dhirubhai Ambani Inst. for Information and Communication Tech., India Marc Lacoste France Telecom R&D/Orange Labs, France Mar챠a Francisca Hinarejos University of the Balearic Islands, Spain Mark Billinghurst Univ. of Canterbury, New Zealand Masoom Alam Institute of Management Sciences(Assistant Professor),Pakistan Miguel Soriano Universitat Politecnica de Catalunya, Spain Nicolas Sklavos Tech. Educational Institute of Patras, Greece Olivier Markowitch ULB, Belgium Panagiotis Rizomiliotis University of the Aegean, Greece Pierangela Samarati Department of Information Technologies, University of Milan, Italy Rodrigo Roman Castro University of Malaga, Spain Ruben Rios del Pozo University of Malaga, Spain Sokratis Katsikas Dept. of Technology Education & Digital Systems, University of Piraeus, Greece Stefanos Gritzalis Info-Sec-Lab, University of the Aegean, Greece Sunwoong Choi Kookmin University, Korea Thomas Strang, German Aerospace Center (DLR), Germany Thomas Wook Choi, Hankuk University of Foreign Studies, Korea Won Joo Lee, Inha Technical College, Korea Yong Lee, ChungJu University, Korea |
|