posted by user: pseymer || 4122 views || tracked by 4 users: [display]

UCSI 2010 : The 1st International Workshop on Ubiquitous Computing Security Issues


When Nov 8, 2010 - Nov 11, 2010
Where London, United Kingdom
Submission Deadline May 31, 2010
Notification Due Jun 30, 2010
Final Version Due Jul 31, 2010
Categories    ubiquitous computing   security

Call For Papers

The 1st International Workshop on Ubiquitous Computing Security Issues (UCSI'10)

The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010)
November 8-11, 2010, London, UK

In the last few years we have witnessed a significant increase in the use of computers and mobile devices in Ubiquitous Computing Systems. While this is a welcome trend, security concerns are becoming one of the major problems. It is affecting the adoption rate and usage of these systems. Unless deliberate efforts are taken to secure these systems from design to implementation most of the development achieved to date may not be realised and rolled out to the real world.

The Ubiquitous Computing Security Issues (UCSI) workshop will bring together researchers and industry participants who are involved with the design, development, and implementation of novel applications and frameworks in the domain of Ubiquitous Computing. The UCSI workshop will provide a high profile, leading edge forum for researchers and engineers alike to present state-of-the-art research in the field of security for Ubiquitous Computing.

The UCSI workshop invites original, high-quality research contributions. In particular contributions that identify the state-of-the-art in the design, development, deployment, evaluation and understanding of security issues for Ubiquitous Computing systems.

Format and Duration
The workshop is intended to take half a day. It will comprise of short presentations on the key security issues. These issues will then be open for review and discussion. At the end of the workshop a panel session will be held to sum up the major findings and contributions made during the workshop.

Topics of interest include but not limited to:

* Security Challenges in Ubiquitous Computing Systems
* Design Principles of Secure Ubiquitous Computing Systems
* Issues and Challenges of Ubiquitous Computing in e-Healthcare
* Security and Privacy Concerns in Ubiquitous Computing Systems
* Security Concerns in Positioning and Tracking Technologies
* Privacy Concerns in Context-Aware Systems and Smart Environments
* Techniques and Challenges for Implementing Secure Smart Environments
* Legal and Ethical Issues relating to Ubiquitous Computing Systems

Important Dates
Paper submission deadline: May 31, 2010
Notification of paper acceptance/rejection: June 30, 2010
Camera-ready paper submission: July 31, 2010

Submission details
The UCSI workshop invites original, high-quality research contributions from researchers and practitioners from academia and industry. All are invited to submit papers limited to 6 pages in IEEE format, describing original work or a position paper. Participants will be selected based on their submissions; a selection of papers will be presented at the workshop. All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.

Authors of accepted papers will be expected to present their work at the workshop. All attendees must register for the ICITST 2010 conference -

Paper must be submitted electronically to . All papers will be fully refereed by at least two referees and before final acceptance all referees' comments must be considered. The required formats of the paper are available on the conference website

Program Co-Chairs
Fredrick Mtenzi, Dublin Institute of Technology, Ireland
Ciaran O'Driscoll, Dublin Institute of Technology, Ireland
Dennis Lupiana, Dublin Institute of Technology, Ireland

Program Committee
Mike Jackson, Birmingham City University, UK
Kudakwashe Dube, Hamilton University, New Zealand
Laurence T. Yang, St. Francis Xavier University, Canada
Ion Tutanescu, University of Pitesti, Romania
Maaruf Ali, Oxford Brookes University, UK
Emmanuel Mkusa, Namibia University, Namibia
Tom Dowling, Claude Shannon Institute, Ireland
Ali Al-Dahoud, Al-Zaytoonah University, Jordan
Juanita Fernando, Monash University, Australia
George S. Oreku, Tanzania Industrial Research and Development Organisation, Tanzania


Dr. Fredrick Mtenzi

Related Resources

ICENT--EI Compendex, Scopus 2020   2020 2nd International Conference on Emerging Networks Technologies (ICENT 2020)--Ei Compendex, Scopus
SP 2020   IEEE Symposium on Security and Privacy
IJU 2020   International Journal of Ubiquitous Computing
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ACM--ICACS--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Algorithms, Computing and Systems (ICACS 2020)--Ei Compendex, Scopus
PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
MoWiN 2020   9th International Conference on Mobile & Wireless Networks
ICACS--ACM, Ei and Scopus 2020   ACM--2020 4th International Conference on Algorithms, Computing and Systems (ICACS 2020)--Ei Compendex, Scopus