posted by user: mich || 10204 views || tracked by 25 users: [display]

ICITST 2009 : The IEEE 4th International Conference for Internet Technology and Secured Transactions 2009

FacebookTwitterLinkedInGoogle


Conference Series : International Conference for Internet Technology and Secured Transactions
 
Link: http://www.icitst.org/
 
When Nov 9, 2009 - Nov 13, 2009
Where London, UK
Submission Deadline Jul 17, 2009
Notification Due Sep 5, 2009
Final Version Due Sep 15, 2009
Categories    internet   security   transaction
 

Call For Papers

CALL FOR PAPERS

The IEEE 4th International Conference for Internet Technology and Secured Transactions 2009 (IEEE ICITST-2009)
November 9–13, 2009, London, UK (www.icitst.org)

The IEEE 4th International Conference for Internet Technology and Secured Transactions (IEEE ICITST-2009) is co-sponsored by IEEE UK/RI Section.
The IEEE ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet
transactions and to fostering discussions on information technology evolution. The IEEE ICITST aims to provide a highly professional and comparative
academic research forum that promotes collaborative excellence between academia and industry. The objectives of the IEEE ICITST are to bridge the
knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology
evolution to secured transactions. The IEEE ICITST-2009 invites and welcomes research papers that encompass conceptual analysis, design
implementation and performance evaluation. All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore.
All the IEEE ICITST papers are indexed by DBLP.

The topics in IEEE ICITST-2009 include but are not confined to the following areas:
* Application of agents
* Application security
* Blended Internet security methods
* Biometrics
* Boundary issues of Internet security
* Broadband access technologies
* Challenges of content authoring
* Data mining security
* E-society
* Globalisation of information society
* Government, and corporate Internet security policy
* Internet architecture
* Infonomics
* IPSec quality of services
* Patentability
* Regulation, self-regulation, and co-regulation Web services
* Secured database systems
* Synchronising e-security
* Technology-enabled information
* Trust, privacy, and data security
* Wireless transactions
* Context-Awareness and its Data mining for Ubi-com service
* Human-Computer Interface and Interaction for Ubi-com
* Smart Homes and its business model for Ubi-com service
* Intelligent Multimedia Service and its Data management for Ubi-com
* USN / RF-ID for Ubi-com service
* Network security issues, protocols, data security in Ubi-com
* Database protection for Ubi-com
* Privacy Protection and Forensic in Ubi-com
* Multimedia Security in Ubi-com
* Quality of Service Issues
* Authentication and Access control for data protection in Ubi-com
* Information visualization
* Web services
* Service, Security and its Data management for U-commerce
* New novel mechanism and Applications for Ubi-com
* Information Management
* Multimedia Information Systems
* Information Retrieval
* Natural Language Processing
* Digital Libraries
* Data and Information Quality Management
* Data Grids, Data and Information Quality
* Database Management
* Web Databases
* Temporal and Spatial Databases
* Data Mining
* Web Mining including Web Intelligence and Web 3.0
* E-Learning, eCommerce, e-Business and e-Government
* Web Metrics and its applications
* XML and other extensible languages
* Semantic Web and Ontology
* Human-Computer Interaction
* Artificial Intelligence and Expert Systems
* Knowledge Management
* Ubiquitous Systems
* Peer to Peer Data Management
* Interoperability
* Mobile Data Management
* Data Models for Production Systems and Services
* Data Exchange issues and Supply Chain
* Data Life Cycle in Products and Processes
* Case Studies on Data Management, Monitoring and Analysis
* Security and Access Control
* Information Content Security
* Mobile, Ad Hoc and Sensor Network Security
* Distributed information systems
IMPORTANT DATES
Full Paper July 17, 2009
Proposal for Workshops and Tutorials April 30, 2009
Notification of Workshop Acceptance May 15, 2009
Proposal for Industrial Presentation April 30, 2009
Notification of Industrial Presentation Acceptance May 15, 2009
Notification of Paper Acceptance/Rejection September 5, 2009
Camera Ready Paper Due September 15, 2009
Author Registration October 01, 2009
Early Bird Attendee registration October 15, 2009
Conference Dates November 9-12, 2009

PROGRAM COMMITTEES

General Chairs
Godfried Williams, University of East London, UK
Ion Tutanescu, University of Pitesti, Romania

General Vice-chairs
Kevin J. Lü, Brunel University, UK
Shi-Cho Cha, National Taiwan University of Science and Technology, Taiwan, ROC

Technical Program Co-chair
Bernd Markscheffel, Technische Universität Ilmenau, Germany

International Co-chairs
Nicu Bizon, University of Pitesti, Romania
Titus Olaniyi, London South Bank University, UK

Poster and Demo Co-chair
Fred Mtenzi, Dublin Institute of Technology, Ireland

Local Arrangements Chairs
Alex Logvynovskiy, University of East London, UK
Cyril Azenabor, University of East London, UK

Research Student Forum Chair
Taiwo Ayodele, University of Portsmouth, UK

Publication Chairs
Charles A. Shoniregun, Sheridan Institute of Technology and Advanced Learning, Canada
Maaruf Ali, Oxford Brookes University, UK

Publicity and Workshop Chair
Galyna Akmayeva, Wessex Institute of Technology / University of Wales, UK

Industrial Chair
Jen-Yao Chung, IBM T. J. Watson Research Center, New York, USA

Steering Committees
Paul Hofmann, Vice President Research, SAP Labs, USA
Brendan O'Shea, Dublin Institute of Technology, Ireland
Liang-Jie (LJ) Zhang, IBM T. J. Watson Research Centre, New York, USA
Charles A. Shoniregun, Sheridan Institute of Technology and Advanced Learning, Canada
Maaruf Ali, Oxford Brookes University, UK
Dragana Martinovic, University of Windsor, Canada
Victor Ralevich, Sheridan Institute of Technology and Advanced Learning, Canada
Ali Al-Dahoud, Al-Zaytoonah University of Jordan, Jordan

TECHNICAL PROGRAM COMMITTEES
Technical Program Committee members names and their affiliations are available at www.icitst.org

Related Resources

IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
ICITST 2024   International Conference for Internet Technology and Secured Transactions
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
GenAI and LVMs for Biometrics 2025   IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM) Special Issue on Generative AI and Large Vision-Language Models for Biometrics