From mboxrd@z Thu Jan 1 00:00:00 1970 X-Sympa-To: caml-list@inria.fr Received: from mail1-relais-roc.national.inria.fr (mail1-relais-roc.national.inria.fr [192.134.164.82]) by walapai.inria.fr (8.13.6/8.13.6) with ESMTP id p592c1mY001562 for ; Thu, 9 Jun 2011 04:38:01 +0200 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AtQBACkx8E3U4xEJkWdsb2JhbABShEmhbBQBAQEBCQsLBxQDIqgxji2QcIUZgQoEoG4 X-IronPort-AV: E=Sophos;i="4.65,340,1304287200"; d="scan'208,217";a="110746874" Received: from moutng.kundenserver.de ([212.227.17.9]) by mail1-smtp-roc.national.inria.fr with ESMTP; 09 Jun 2011 04:37:55 +0200 Received: from oxltgw01.schlund.de (oxltgw01.schlund.de [172.19.158.39]) by mrelayeu.kundenserver.de (node=mrbap3) with ESMTP (Nemesis) id 0MS2e2-1Q6ti13OH4-00TCf3; Thu, 09 Jun 2011 04:36:47 +0200 Date: Thu, 9 Jun 2011 03:36:47 +0100 (BST) From: "g.akmayeva@icitst.org" To: "info, ICITST" Message-ID: <301854025.43937.1307587007809.JavaMail.open-xchange@oxltgw01.schlund.de> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_43936_1992257207.1307587007676" Disposition-Notification-To: "g.akmayeva@icitst.org" X-Priority: 3 Importance: Medium X-Mailer: Open-Xchange Mailer v6.20.0-Rev11 X-Provags-ID: V02:K0:QgbKnqwVKLhUiMjri6aylc6NjX18e6cqcy36jlUusPX OMDOquvM9rt39uRMQZ9mj6gyilE0O0gaDeVO5BMi67oDYoMxWx hSS4n+FFLtndhj6a1Pj4zFJxN8/VEU03SEH8FstO1PpKQZ8l7f PqHPrLXQ9unsPPH32SFcYYxcJ5S9zNkwNeRmcY2lwGXgk6apZo 53qOmhvXL0EgXumatGiuK59RYs2BD4xtAGMu+umxQg= X-Validation-by: g.akmayeva@icitst.org Subject: [Caml-list] Call for Papers: The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)! ------=_Part_43936_1992257207.1307587007676 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Apologies for cross-postings! Kindly email this Call for Papers to your colleagues, faculty members and postgraduate students. CALL FOR PAPERS ************************************************************ The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Technical Co-Sponsored=C2=A0 by IEEE UAE Computer Chapter December 11=E2=80=9314, 2011, Abu Dhabi, UAE (www.icitst.org)=C2=A0 ************************************************************=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011) is Technical Co-sponsored by IEEE UAE Computer Chapter. The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 The topics in ICITST-2011 include but are not confined to the following areas: =C2=A0 Internet Application and Technology: * Internet Architecture * Internet of things * Broadband Access Technologies * Application Agents * Boundary Issues of Internet Security * Database Management * Data Models for Production Systems and Services * Artificial Intelligence and Expert Systems * IPSec Quality of Service * Knowledge Management * Embedded Systems * Defence Systems Ubi/Cloud Computing: * Authentication and Access Control for Data Protection in Ubi/Cloud Comput= ing * Context-Awareness and its Data Mining for UbiCom * Data Grids * Distributed Information Systems * Human-Computer Interface and Interaction for UbiCom * Ubiquitous Systems * USN/RFID Service * Smart Homes and its Business Model for UbiCom Service * Security and its Data Management for UbiCom * Peer to Peer Data Management * New Novel Mechanism and Application for Ubi/Cloud Computing Information Security: * Trust, Privacy and Data Security * Network Security Issues and Protocols * Security Challenges and Content Authoring * Cryptography * Secure Communications * Authentication Techniques * Chaos-based Data Security * MANET Security * Wireless Sensor Network Security * Organization Considerations in Security Policy Formulation and Implementa= tions * Digital Forensics and Crimes * Biometrics * Cyber Security Multimedia and Web Services: * Intelligent Multimedia and its Data Management * Multimedia Information Systems * Multimedia Security * Web Databases * Web Metrics and its Applications * Web Mining including Web Intelligence and Web 3.0. * Web Services * XML and other extensible languages * Semantic Web and Ontology Infonomics and e-Technology: * Infonomics * Information Visualization * Information Management * Information Quality * Technology-Enabled Information * e-Learning * e-Commerce * e-Business * e-Government * e-Society * System Design and Security for e-Services * Synchronizing e-Security IMPORTANT DATES =C2=A0 Full Paper Submission Date: August 26, 2011 Extended Abstract (Work in Progress) Submission Date: July 31, 2011 Proposal for Workshops and Tutorials: May 31, 2011 Notification of Workshop and Tutorial Acceptance: June 05, 2011 Proposal for Industrial Presentation: April 30, 2011 Notification of Extended Abstract Acceptance/Rejection: August 15, 2011 Notification of Industrial Presentation Acceptance: May 10, 2011 Notification of Paper Acceptance/Rejection: September 30, 2011 Camera Ready Extended Abstract Due: August 31, 2011 Camera Ready Paper Due: October 14, 2011 Early Registration Deadline (Authors only): May 01 to October 14, 2011 Late Registration Deadline (Authors only): October 14 to November 15, 2011 Participants Registration: May 01 to December 14, 2011 Conference Dates: December 11-14, 2011=C2=A0 For more details, please contact info@icitst.org= ------=_Part_43936_1992257207.1307587007676 MIME-Version: 1.0 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 7bit

Apologies for cross-postings!

Kindly email this Call for Papers to your colleagues,
faculty members and postgraduate students.


CALL FOR PAPERS

************************************************************
The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011),
Technical Co-Sponsored  by IEEE UAE Computer Chapter
December 11–14, 2011, Abu Dhabi, UAE
(www.icitst.org) 
************************************************************                              
     
The 6th International Conference for Internet Technology and Secured
Transactions (ICITST-2011) is Technical Co-sponsored by IEEE UAE
Computer Chapter. The ICITST is an international refereed conference
dedicated to the advancement of the theory and practical implementation
of secured Internet transactions and to fostering discussions on information
technology evolution. The ICITST aims to provide a highly professional
and comparative academic research forum that promotes collaborative
excellence between academia and industry.                                                                                                              
The topics in ICITST-2011 include but are not confined to the
following areas:
 
Internet Application and Technology:
* Internet Architecture
* Internet of things
* Broadband Access Technologies
* Application Agents
* Boundary Issues of Internet Security
* Database Management
* Data Models for Production Systems and Services
* Artificial Intelligence and Expert Systems
* IPSec Quality of Service
* Knowledge Management
* Embedded Systems
* Defence Systems

Ubi/Cloud Computing:
* Authentication and Access Control for Data Protection in Ubi/Cloud Computing
* Context-Awareness and its Data Mining for UbiCom
* Data Grids
* Distributed Information Systems
* Human-Computer Interface and Interaction for UbiCom
* Ubiquitous Systems
* USN/RFID Service
* Smart Homes and its Business Model for UbiCom Service
* Security and its Data Management for UbiCom
* Peer to Peer Data Management
* New Novel Mechanism and Application for Ubi/Cloud Computing

Information Security:
* Trust, Privacy and Data Security
* Network Security Issues and Protocols
* Security Challenges and Content Authoring
* Cryptography
* Secure Communications
* Authentication Techniques
* Chaos-based Data Security
* MANET Security
* Wireless Sensor Network Security
* Organization Considerations in Security Policy Formulation and Implementations
* Digital Forensics and Crimes
* Biometrics
* Cyber Security

Multimedia and Web Services:
* Intelligent Multimedia and its Data Management
* Multimedia Information Systems
* Multimedia Security
* Web Databases
* Web Metrics and its Applications
* Web Mining including Web Intelligence and Web 3.0.
* Web Services
* XML and other extensible languages
* Semantic Web and Ontology

Infonomics and e-Technology:
* Infonomics
* Information Visualization
* Information Management
* Information Quality
* Technology-Enabled Information
* e-Learning
* e-Commerce
* e-Business
* e-Government
* e-Society
* System Design and Security for e-Services
* Synchronizing e-Security


IMPORTANT DATES
 
Full Paper Submission Date: August 26, 2011
Extended Abstract (Work in Progress) Submission Date: July 31, 2011
Proposal for Workshops and Tutorials: May 31, 2011
Notification of Workshop and Tutorial Acceptance: June 05, 2011
Proposal for Industrial Presentation: April 30, 2011
Notification of Extended Abstract Acceptance/Rejection: August 15, 2011
Notification of Industrial Presentation Acceptance: May 10, 2011
Notification of Paper Acceptance/Rejection: September 30, 2011
Camera Ready Extended Abstract Due: August 31, 2011
Camera Ready Paper Due: October 14, 2011
Early Registration Deadline (Authors only): May 01 to October 14, 2011
Late Registration Deadline (Authors only): October 14 to November 15, 2011
Participants Registration: May 01 to December 14, 2011
Conference Dates: December 11-14, 2011 

For more details, please contact info@icitst.org

------=_Part_43936_1992257207.1307587007676--