posted by user: pseymer || 4849 views || tracked by 4 users: [display]

UCSI 2010 : The 1st International Workshop on Ubiquitous Computing Security Issues

FacebookTwitterLinkedInGoogle

Link: http://www.comp.dit.ie/ucsi2010
 
When Nov 8, 2010 - Nov 11, 2010
Where London, United Kingdom
Submission Deadline May 31, 2010
Notification Due Jun 30, 2010
Final Version Due Jul 31, 2010
Categories    ubiquitous computing   security
 

Call For Papers

*****************************************************************************************
The 1st International Workshop on Ubiquitous Computing Security Issues (UCSI'10)
http://www.comp.dit.ie/ucsi2010/

The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010)
November 8-11, 2010, London, UK
http://www.icitst.org/Home.html
******************************************************************************************

Introduction
============
In the last few years we have witnessed a significant increase in the use of computers and mobile devices in Ubiquitous Computing Systems. While this is a welcome trend, security concerns are becoming one of the major problems. It is affecting the adoption rate and usage of these systems. Unless deliberate efforts are taken to secure these systems from design to implementation most of the development achieved to date may not be realised and rolled out to the real world.

The Ubiquitous Computing Security Issues (UCSI) workshop will bring together researchers and industry participants who are involved with the design, development, and implementation of novel applications and frameworks in the domain of Ubiquitous Computing. The UCSI workshop will provide a high profile, leading edge forum for researchers and engineers alike to present state-of-the-art research in the field of security for Ubiquitous Computing.

The UCSI workshop invites original, high-quality research contributions. In particular contributions that identify the state-of-the-art in the design, development, deployment, evaluation and understanding of security issues for Ubiquitous Computing systems.


Format and Duration
===================
The workshop is intended to take half a day. It will comprise of short presentations on the key security issues. These issues will then be open for review and discussion. At the end of the workshop a panel session will be held to sum up the major findings and contributions made during the workshop.


Topics of interest include but not limited to:
==============================================

* Security Challenges in Ubiquitous Computing Systems
* Design Principles of Secure Ubiquitous Computing Systems
* Issues and Challenges of Ubiquitous Computing in e-Healthcare
* Security and Privacy Concerns in Ubiquitous Computing Systems
* Security Concerns in Positioning and Tracking Technologies
* Privacy Concerns in Context-Aware Systems and Smart Environments
* Techniques and Challenges for Implementing Secure Smart Environments
* Legal and Ethical Issues relating to Ubiquitous Computing Systems


Important Dates
===============
Paper submission deadline: May 31, 2010
Notification of paper acceptance/rejection: June 30, 2010
Camera-ready paper submission: July 31, 2010


Submission details
==================
The UCSI workshop invites original, high-quality research contributions from researchers and practitioners from academia and industry. All are invited to submit papers limited to 6 pages in IEEE format, describing original work or a position paper. Participants will be selected based on their submissions; a selection of papers will be presented at the workshop. All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.

Authors of accepted papers will be expected to present their work at the workshop. All attendees must register for the ICITST 2010 conference - http://www.icitst.org/Registration.html.

Paper must be submitted electronically to Fredrick.Mtenzi@dit.ie . All papers will be fully refereed by at least two referees and before final acceptance all referees' comments must be considered. The required formats of the paper are available on the conference website http://www.icitst.org/Paper%20Submission.html.


Program Co-Chairs
=================
Fredrick Mtenzi, Dublin Institute of Technology, Ireland
Ciaran O'Driscoll, Dublin Institute of Technology, Ireland
Dennis Lupiana, Dublin Institute of Technology, Ireland


Program Committee
=================
Mike Jackson, Birmingham City University, UK
Kudakwashe Dube, Hamilton University, New Zealand
Laurence T. Yang, St. Francis Xavier University, Canada
Ion Tutanescu, University of Pitesti, Romania
Maaruf Ali, Oxford Brookes University, UK
Emmanuel Mkusa, Namibia University, Namibia
Tom Dowling, Claude Shannon Institute, Ireland
Ali Al-Dahoud, Al-Zaytoonah University, Jordan
Juanita Fernando, Monash University, Australia
George S. Oreku, Tanzania Industrial Research and Development Organisation, Tanzania

ENQUIRIES
=========

Dr. Fredrick Mtenzi
Fredrick.Mtenzi@dit.ie

Related Resources

LAJC 2024   Latin-American Journal of Computing
CSW 2024   2024 3rd International Conference on Cyber Security
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
WiMoNe 2024   16th International Conference on Wireless & Mobile Networks
UbiSec 2024   The 4th International Conference on Ubiquitous Security
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
BMLI 2024   5th International Conference on Big Data, Machine Learning and IoT
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data