Call for Papers: ICITST 2006, Sep. 11-13, London, UK
by arslan.broemme@aviomatik.de
--- Ursprüngliche Nachricht ---
Datum: 24.02.2006 14:04
Von: Biometrik und elektronische Signaturen <biosig(a)gi-fb-sicherheit.de>
An: fbsec(a)gi-fb-sicherheit.de, ada(a)gi-fb-sicherheit.de,
biosig(a)gi-fb-sicherheit.de, ecom(a)gi-fb-sicherheit.de,
ezqn(a)gi-fb-sicherheit.de, fomsess(a)gi-fb-sicherheit.de,
kritis(a)gi-fb-sicherheit.de, krypto(a)gi-fb-sicherheit.de,
netsec(a)gi-fb-sicherheit.de, pet(a)gi-fb-sicherheit.de,
secmgt(a)gi-fb-sicherheit.de, sidar(a)gi-fb-sicherheit.de,
stewa(a)gi-fb-sicherheit.de
Betreff: [BIOSIG] Call for Papers: ICITST 2006, Sep. 11-13, London, UK
>
> Liebe Mitglieder des FB Sicherheit ,
>
>
> es wird zur Einreichung von Beitraegen fuer die ICITST 2006
> (http://www.icitst.org/) aufgerufen.
> Die Details sind unten angehaengt. Bitte entschuldigen Sie den ggf.
> mehrfachen Erhalt dieser eMail.
>
>
> Mit freundlichen Gruessen
>
>
> Arslan Broemme
>
>
> -----------
> Arslan Broemme
>
> IT Advisory Group AG
> Dekan-Laist-Strasse 52, 55129 Mainz
>
> Fon: 06131/66909-0 / Fax: -66 / Mobil: 0163/6506836
> eMail. arslan.broemme(a)it-advisory.com
> Web: http://www.it-advisory.com
>
>
> International Conference for Internet Technology and Secured
Transactions
> 2006 (ICITST-2006)
>
> September 11â13, 2006, London, United Kingdom
>
>
> Sponsored by (Embedded image moved to file: pic26962.jpg) (Embedded
image
> moved to file: pic24464.jpg) and in cooperation with (Embedded image
> moved to file: pic05705.jpg)
>
>
> (Embedded image moved to file: pic28145.jpg) (Embedded image moved
to
> file: pic23281.jpg)
>
>
> The International Conference for Internet Technology and Secured
> Transactions (ICITST-2006) is an international refereed conference
> dedicated to the advancement of the theory and practical implementation
of
> secured Internet transactions and to fostering discussions on
information
> technology evolution. ICITST aims to provide a highly professional and
> comparative academic research forum that promotes collaborative
excellence
> between academia and industry.
>
>
> The objectives of ICITST-2006 are to bridge the knowledge gap between
> academia and industry, promote research esteem in secured Internet
> transactions and the importance of information technology evolution to
> secured transactions. ICITST-2006 invites and welcomes research papers
that
> encompass conceptual analysis, design implementation and performance
> evaluation.
>
>
> Conference Theme
>
> The International Conference for Internet Technology and Secured
> Transactions (ICITST-2006) is an international refereed conference
> dedicated to the advancement of the theory and practical implementation
of
> secured Internet transactions and to fostering discussions on
information
> technology evolution. ICITST aims to provide a highly professional and
> comparative academic research forum that promotes collaborative
excellence
> between academia and industry.
>
>
> The objectives of ICITST-2006 are to bridge the knowledge gap between
> academia and industry, promote research esteem in secured Internet
> transactions and the importance of information technology evolution to
> secured transactions. ICITST-2006 invites and welcomes research papers
that
> encompass conceptual analysis, design implementation and performance
> evaluation.
>
> Topics of Interest
>
> The coverage of ICITST-2006 includes, but is not limited to, the
following
> subjects:
>
> · Application of agents
> · Application security
> · Blended Internet security methods
> · Biometrics
> · Boundary issues of Internet security
> · Broadband access technologies
> · Challenges of content authoring
> · Data mining security
> · E-society
> · Globalisation of information society
> · Government, and corporate Internet security policy
> · Internet architecture
> · Infonomics
> · IPSec quality of services
> · Patentability
> · Regulation, self-regulation, and co-regulation
> · Web services
> · Secured database systems
> · Synchronising e-security
> · Technology-enabled information
> · Trust, privacy, and data security
> · Wireless transactions
> Proceedings
>
> All papers accepted for the conference, including special sessions
papers,
> will be published in the proceedings. The Proceedings of the
International
> Conference for Internet Technology and Secured Transactions
(ICITST-2006)
> will be published by the e-Centre for Infonomics in a book (CD) with
ISBN
> 0-9546628-2-2.
>
> Best Paper Award
>
> Author(s) of best paper will receive one of ICITST-2006 awards and
> certificate of achievement and contribution to research within the
subject
> area of the paper.
>
> Important Dates
>
> Paper submissions
>
>
> 1 May 2006 - paper submission
>
>
> 1 June - notification of acceptance
>
>
> 15 June 2006 - final paper submission
>
>
> Poster submissions
>
>
> 10 May 2006 - poster submission
>
>
> 1 June 2006 - notification of acceptance
>
>
> 15 June 2006 - final poster submission
>
> Conference Venue
>
> University of East London (UeL), Docklands, London, United Kingdom
>
>
> The ICITST-2006 conference location is 3 to 5 minutes drive from London
> City Airport. It will take 15 to 20 minutes by Train to central London.
On
> arrival at the hotel or conference venue each participant will be
giving
> detail map of important places to visit in London.
>
> Executive committee
>
> General Chair
>
> · Charles A. Shoniregun, University of East London, UK
>
> General Vice-chair
>
> · Caterina Scogli, Kansas State University, USA
>
> Technical Program Co-chairs
>
> · Minglu Li, Shanghai Jiao Tong University, China
> · Dominic Palmer-Brown, University of East London, UK
> · Qun Jin, Waseda University, Japan
>
> International Co-chairs
>
> · Tricha Aniali, Illinois Institute of Technology, USA
> · Maaruf Ali, Oxford Brookes University, UK
> · Jean-Marc Seigneur, University of Geneva, SWITZERLAND
>
> Poster and Demo Co-chairs
>
> · Alex Logvynovskiy, London South Bank University
> · Elhadi Shakshuki, Acadia University, Canada
>
> Local Arrangements Co-chairs
>
> · David Xiao, University of East London, UK
> · Mohammad Dastbaz, University of Greenwich, UK
>
> Special Session and Workshop Co-chairs
>
> · Kevin Lü, Brunel University, UK
> · Ion Tutanescu, University of Pitesti, Romania
>
> Publication Chair
>
> · Stuart Barnes, University of East Anglia, UK
>
> Publicity Chair
>
> · Zhixiong Chen, Mercy College, USA
>
> Industrial Chair
>
> · Jen-Yao Chung, IBM T. J. Watson Research Center, New York, USA
> Steering Committee
> · Cungen Cao, Institute of Communication and Technology, China
> · Paul Smith, University of East London, UK
> · Robert Macredie, Brunel University, UK
> · Andrea Baicchi, University of Rome âLa Sapienzaâ, Italy
> · Charles A. Shoniregun, University of East London, UK
>
> Technical Programme Committee Members
> · Anne Anderson, Sun Microsystems Labs, USA
> · Bendick Mahleko, Fraunhofer Gesellschaft, IPSI, Darmstadt,
Germany
> · Hiroshi Mineno, Shizuoka University, Japan
> · Whai-En Chen, National Chiao Tung University, Taiwan
> · Félix J. GarcÃa Clemente, University of Murcia, Madrid â
Spain
> · George Spanoudakis, City University, London, UK
> · Fernando Lyardet, Telecooperation / TU-Darmstadt, Germany
> · Christian Werner, University of Lübeck, Germany
> · Miguel Angel Diaz, Consulintel, Madrid â Spain
> · Venkat N. Gudivada, Marshall University,USA
> · John King, British Telecommunications plc, UK
> · Rafa Marin Lopez, Universidad de Murcia, Spain
> · Andreas Wombacher, Universiteit Twente (UT), Netherlands
> · Miguel A. Diaz, Consulintel, Madrid â Spain
> · Fritsche Wolfgang, IABG, Germany
> · Dario Maggiorini, Università degli studi di Milano, Italy
> · Ping Yi, Shanghai Jiao Tong University, Shanghai, China
> · Silvia Gordillo, Universidad Nacional de La Plata, Argentina
> · Peter Bieringer, Deep Space 6, Germany
> · Chris Imafidon, University of East London, UK
> · Arslan Broemme, IT Advisory Group AG, Germany
> · Terry Fanning, British Telecommunications plc, UK
> · Farouk Missi, Brunel University, UK
> · Claudio Bartolini, Hewlett-Packard (hp), USA
> · Makoto Amamiya, Kyushu University, Japan
> · Mieso Denko, University of Guelph, Canada
> · Laurence T. Yang, St. Francis Xavier University, Canada
> · Lundy Lewis, Southern New Hampshire University, USA
> · Jiannong Cao, Hong Kong Polytechnic Univ., HK
> · Thomas Noel, Louis Pasteur University, France
> · Matthew Ford, British Telecommunication, UK
> · Jeannette S Chin, University of Essex, UK
> · Nicola Fanizzi, Universita di Bari, Italy
>
>
15 years
CALL FOR PAPERS - Workshop "Security and Privacy in Future Business Services" at ETRICS'06
by netsec@m-strasser.de
CALL FOR PAPERS
Paper submission deadline has been extended to
New Submission Deadline February 28, 2006
============================================================================
Workshop Security and Privacy in Future Business Services
============================================================================
International Conference on
Emerging Trends in Information and Communication Security
/\
||__^_ /\ ETRICS 2006
_/\_| \_||______________________________________________________________
June 6-9, 2006, FREIBURG, GERMANY
http://www.etrics.org/workshops
Individualization of business services is one of the most promising business
development prospects for future markets. Customized products and services,
individual price differentiation, personalized promotions, and
location/time-sensitive addressing of customers are raising marketers
attention. Particularly ubiquitous com¬puting technologies, with their
mobile and wireless interfaces, are laying the grounds for these
developments: information about purchase behavior and location, proximity,
presence, after-sales usage patterns, and even personal emotional states
will potentially be combined and analyzed.
Technical progress, however, not only improves the available data pool but
also results in new challenges for security and privacy. Handling the
trade-off between high-quality individualized services and maintaining
pri¬vacy and security seems to be a key factor for business success. Without
suitable mechanisms for enforcing the correct handling of data collection
and processing, new service ideas may not receive marketplace acceptance.
This workshop therefore focuses on technical and economic mechanisms
addressing the trade-off between privacy and individualization. It aims to
bring together privacy experts on an international level to discuss recent
advances in trust-promoting mechanisms. To this end, the workshop seeks
submissions from academia and industry presenting novel research on
theoretical and practical aspects of security and privacy technologies as
well as economic models that may enforce a correct handling of sensitive
data. Theoretical work, prototypes and experimental studies are equally
welcome.
Selected contributions will be invited to submit a full paper to a special
issue of the Wirtschaftsinformatik journal.
Topics of interest include but are not limited to:
==================
* Valuation of personal data/private information
* Private data markets and market mechanisms
* Trust management from a business process perspective
* Trust management from a technical perspective
* Political dimensions of privacy and security
* Drivers of technology acceptance: what is the role of privacy and security
in a Technology Acceptance Model?
* Empirical studies on privacy and/or security perception and behavior
* Technical mechanisms to promote trust, privacy and security, especially
- Reputation mechanisms
- Architectures and models for identity management
- Pseudonymity management
- Anonymity
- Authentication
* Privacy and security for RFID and location-based technologies
* Privacy-enhancing technologies for enterprises
Important Dates:
================
February 28, 2006: Submission of position paper (send 2 pages to
sackmann(a)iig.uni-freiburg.de),
March 10, 2006: Notification of acceptance for the workshop,
March 10, 2006: Invitation to submit a full paper to the journal
Wirtschaftsinformatik
Workshop Chairs:
================
Stefan Sackmann, University of Freiburg, Germany
Sarah Spiekermann, University of Berlin, Germany
Program Committee:
==================
Alessandro Acquisti, Carnegie Mellon University, Pittsburgh, USA
Jens Grossklags, UC Berkeley, USA
Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein,
Germany
Marc Langheinrich, ETH Zurich, Switzerland
Ursula Sury, Hochschulen für Wirtschaft und Technik und Architektur Luzern,
Switzerland
15 years