Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    TUN-MM 2010 - Special Session on Trusted Ubiquitous Networks & Multimedia Contents Protection for International Conference on High Performance Computing & Simulation

    View: 2193

    Website http://cisedu.us/cis/hpcs/10/main/storageDocs.jsp?doc=/docs/hpcs/10/sessions/SS1.TUN_MM.html | Want to Edit it Edit Freely

    Category TUN-MM 2010

    Deadline: February 28, 2010 | Date: June 28, 2010

    Venue/Country: Caen, France

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    Special Session on Trusted Ubiquitous Networks & Multimedia Contents Protection (TUN-MM 2010)
    CALL FOR PAPERS
    As part of
    The International Conference on High Performance Computing & Simulation (HPCS 2010)
    http://cisedu.us/cis/hpcs/10/main/callForPapers.jsp
    In conjunction with
    The 6th International Wireless Communications and Mobile Computing Conference (IWCMC 2010)
    Extension Submission Deadline: February 28, 2010
    SCOPE AND OBJECTIVES
    Recent years have witnessed rapid developments of the information communication technology and the Next-Generation Internet. 3G and 4G wireless mobile networks have been striding to a large-scale deployment and application. So, we have seen the potential and value for new technologies from a variety of digital networks to various interconnected digital devices, which made it possible to realize the ubiquitous network and society.
    The ubiquitous network could enable a convenient connection ýanytime, anywhere, anything, anyoneý to the information communications network. Yet, it is necessary for users to establish a highly secure and reliable environment in which they could enjoy ubiquitous digital services via ubiquitous network and connectivity. Establishing trustworthy ubiquitous network brings up some urgent and challenging issues.
    In contrast to the cyberspace we have seen until now, the ubiquitous network will be capable of exchanging information more freely beyond the boundaries of time and distance. Unfortunately, in such environment, copyright infringement behaviors, such as illicit copying, malicious distribution, unauthorized usage, free sharing of copyright-protected digital contents, will also become a much more common phenomenon. Contents protection & Digital Rights Management (DRM) have a tangible goal to safeguard the rights and benefits of multimedia contents owners, copyrights holders, digital services providers, and even consumers in contents value chain. Some applications research frontiers, related to contents security, have emerged in recent years. These include subjects on trustworthy networks and transactions, secure digital multimedia broadcasting and controlled contents sharing. Researchers, contents industry engineers and administrators attempt to resort to the state-of-the-art technologies and ideas to protect valuable digital contents and services assets against attacks and IP piracy in the emerging ubiquitous network.
    This special session aims to bring together related research works in the realm of Ubiquitous Network and Multimedia Contents Security, and further investigates and discusses trusted solutions and secure techniques for Ubiquitous Network and Ubiquitous Computing, as well as some open issues faced by digital contents owners/rights holders/multimedia services providers, who dedicate themselves to protect their Intellectual Property Rights and business benefits. In addition, novel ideas and research works from end consumersý perspective, such as privacy, trustworthiness and multimedia contents sharing in ubiquitous network society, will be embraced by the session.
    The Session topics include (but are not limited to) the following:
    * Digital Rights Management & Interoperability
    * Methodologies for Establishing Trust Among Unknown/Un-trusted Entities
    * Authentication, Authorization and Access Control in Ubiquitous Networks
    * Metrics and Measurement Schemes
    * Monitoring and Assessment
    * IP, Privacy and Trust in Ubiquitous Networks
    * Ubiquitous Computing & Web Services
    * Secure Digital Multimedia Broadcasting
    * Multimedia Contents Sharing & Risk Management
    * Contents Security & Protection
    PAPER SUBMISSIONS
    You are invited to submit original and unpublished research works on above and other topics related to trusted ubiquitous networks and multimedia contents protection. Submitted papers must not have been published or simultaneously submitted elsewhere. Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and email addresses. Please, indicate clearly the corresponding author and include up to 6 keywords from the above list of topics and an abstract of no more than 400 words. The full manuscript should be at most 8 pages using the two-column IEEE format. Additional pages will be charged at additional fee. Please include page numbers on all submissions to make it easier for reviewers to provide helpful comments. Submit a PDF copy of your full manuscript via email to the special session organizers at xidianzzyatyahoo.cn and peiqingqiatgmail.com .
    Only PDF files will be accepted. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, technical clarity and presentation. Authors of accepted papers must guarantee that their papers will be registered and presented at the special session. Accepted papers will be published in the conference proceedings which will be made available at the time of the meeting.
    Submission of a paper implies that should the paper be accepted, at least one of the authors will register for the HPCS conference and present the paper in the workshop. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.
    All accepted papers are expected to be published as ISBN proceedings by the IEEE and will be available online through IEEE Digital Library ( EI indexing ).
    IMPORTANT DATES
    Extension Paper Submissions: February 28, 2010
    Acceptance Notification: March 20, 2010
    Camera Ready Papers and Registration Due: April 15, 2010
    SPECIAL SESSION ORGANIZER(S)
    Dr. Zhiyong ZHANG
    Cultural Property Preservation & Digitization Research Center,
    Henan University of Science & Technology
    No. 48, Rd. Xiyuan
    Luoyang, P. R. of China
    Phone: +86 379 64231910
    Fax: +86 379 64231910
    Email: xidianzzyatyahoo.cn
    Homepage: http://cnis-xd.com/~zyzhang/
    Assoc. Prof. Qingqi PEI
    Chinese Ministry of Education Key Laboratory of Computer Network & Information Security,
    Xidian University
    No. 2, South Rd. Taibai
    Xi'an, P. R. of China
    Phone: +86 29 88202859
    Fax: +86 29 88202859
    Email: peiqingqiatgmail.com
    If you have any questions about paper submission or the special session, please contact the Special Session organizers at the above addresses.
    If you have any questions about conference paper submission, please contact Conference Program Chair: Waleed W. Smari, University of Dayton, 300 College Park, Dayton, OH 45469-0226, USA, Voice: (937) 681-0098, Fax: (937) 255-4511, Email: smariatarys.org . For information about the HPCS conference in general, please contact the General Chairs or consult the conference web site at http://cisedu.us/cis/hpcs/10/main/callForPapers.jsp .

    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.