<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="text/html; charset=UTF-8" http-equiv="Content-Type" />
<title></title>
</head>
<body>
<p style="margin: 0px;">Apologies for cross-postings!<br />
<br />
Kindly email this Call for Papers to your colleagues,<br />
faculty members and postgraduate students.<br />
<br />
<br />
<br />
CALL FOR PAPERS<br />
<br />
************************************************************<br />
The 5th International Conference for Internet Technology and<br />
Secured Transactions (ICITST-2010), Technical Co-Sponsored<br />
by IEEE UK/RI Communications Chapter<br />
November 8–11, 2010, London, UK<br />
(www.icitst.org) <br />
************************************************************ <br />
<br />
The ICITST is an international refereed conference dedicated<br />
to the advancement of the theory and practical implementation<br />
of secured Internet transactions and to fostering discussions<br />
on information technology evolution. The ICITST aims to provide<br />
a highly professional and comparative academic research forum<br />
that promotes collaborative excellence between academia and<br />
industry. The objectives of the ICITST are to bridge the<br />
knowledge gap between academia and industry, promote research<br />
esteem in secured Internet transactions and the importance of<br />
information technology evolution to secured transactions.<br />
The ICITST-2010 invites research papers that encompass conceptual<br />
analysis, design implementation and performance evaluation.<br />
All the accepted papers will appear in the proceedings published<br />
by IEEE and fully indexed by IEEE Xplore. All the ICITST papers<br />
are indexed by DBLP.<br />
<br />
<br />
The topics in ICITST-2010 include but are not confined to the<br />
following areas:<br />
<br />
* Application of agents<br />
* Application security<br />
* Blended Internet security methods<br />
* Biometrics<br />
* Boundary issues of Internet security<br />
* Broadband access technologies<br />
* Challenges of content authoring<br />
* Data mining security<br />
* E-society<br />
* Globalisation of information society<br />
* Government, and corporate Internet security policy<br />
* Internet architecture<br />
* Infonomics<br />
* IPSec quality of services<br />
* Patentability<br />
* Regulation, self-regulation, and co-regulation Web services<br />
* Secured database systems<br />
* Synchronising e-security<br />
* Software Architectures<br />
* Technology-enabled information<br />
* Trust, privacy, and data security<br />
* Wireless transactions<br />
* Context-Awareness and its Data mining for Ubi-com service<br />
* Human-Computer Interface and Interaction for Ubi-com<br />
* Smart Homes and its business model for Ubi-com service<br />
* Intelligent Multimedia Service and its Data management for Ubi-com<br />
* USN / RF-ID for Ubi-com service<br />
* Network security issues, protocols, data security in Ubi-com<br />
* Database protection for Ubi-com<br />
* Privacy Protection and Forensic in Ubi-com<br />
* Multimedia Security in Ubi-com<br />
* Quality of Service Issues<br />
* Authentication and Access control for data protection in Ubi-com<br />
* Information visualization<br />
* Web services<br />
* Service, Security and its Data management for U-commerce<br />
* New novel mechanism and Applications for Ubi-com<br />
* Information Management<br />
* Multimedia Information Systems<br />
* Information Retrieval<br />
* Natural Language Processing<br />
* Digital Libraries<br />
* Data and Information Quality Management<br />
* Data Grids, Data and Information Quality<br />
* Database Management<br />
* Web Databases<br />
* Temporal and Spatial Databases<br />
* Data Mining<br />
* Web Mining including Web Intelligence and Web 3.0<br />
* E-Learning, eCommerce, e-Business and e-Government<br />
* Web Metrics and its applications<br />
* XML and other extensible languages<br />
* Semantic Web and Ontology<br />
* Human-Computer Interaction<br />
* Artificial Intelligence and Expert Systems<br />
* Knowledge Management<br />
* Ubiquitous Systems<br />
* Peer to Peer Data Management<br />
* Interoperability<br />
* Mobile Data Management<br />
* Data Models for Production Systems and Services<br />
* Data Exchange issues and Supply Chain<br />
* Data Life Cycle in Products and Processes<br />
* Case Studies on Data Management, Monitoring and Analysis<br />
* Security and Access Control<br />
* Embedded Systems<br />
* Defence Systems<br />
* Information Content Security<br />
* Software Architecture<br />
* System design and verification<br />
* Mobile, Ad Hoc and Sensor Network Security<br />
* Distributed information systems<br />
<br />
IMPORTANT DATES<br />
<br />
<br />
Full Paper Submission Date: May 31, 2010 <br />
Extended Abstract (Work in Progress) Submission Date: April 01, 2010<br />
Proposal for Workshops and Tutorials: April 30, 2010 <br />
Notification of Workshop and Tutorial Acceptance: March 15, 2010<br />
Proposal for Industrial Presentation: April 30, 2010<br />
Notification of Extended Abstract Acceptance/Rejection: May 15, 2010<br />
Notification of Industrial Presentation Acceptance: May 15, 2010<br />
Notification of Paper Acceptance/Rejection: June 30, 2010<br />
Camera Ready Extended Abstract Due: July 31, 2010<br />
Camera Ready Paper Due: July 31, 2010<br />
Early Registration Deadline: January 01 to July 31, 2010<br />
Late Registration Deadline: July 31 to November 08, 2010<br />
Conference Dates: November 08-11, 2010<br />
<br />
The ICITST also encourages organisations to submit their Job Fair<br />
Booth Reservations and/or Exhibit Proposals. If your organisation<br />
is interested, kindly submit a brief Proposal (not more than 1 side<br />
of A4 page) to jobfair@icitst.org<br />
<br />
For more details, please visit www.icitst.org<span></span></p>
</body>
</html>