WORLDCIS 2012 - World Congress on Internet Security (WorldCIS-2012)
View: 2339
Website www.worldcis.org/ |
Edit Freely
Category WORLDCIS 2012
Deadline: January 20, 2012 | Date: June 10, 2012-June 12, 2012
Venue/Country: Ontario, Canada
Updated: 2011-10-14 19:00:57 (GMT+9)
Call For Papers - CFP
The World Congress on Internet Security (WorldCIS-2012) is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.On the ubiquitous networking environments, information is explosively used for various kinds of purposes. From a service perspective, a number of context or ambient aware services are envisaged for "ubiquitous networking" but based on the context security remains an issue.The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and and to fostering discussions on information technologies, information systems and globa security applications. The WorldCIS-2012 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation.Topics of InterestOriginal papers are invited on recent advances in Internet, Computer Communications and Networking Scuerity. The topics in WorldCIS-2012 include but are not confined to the following areas:Access Control Accountability Anonymity Application security Attacks and defenses Authentication Censorship and censorship-resistance Distributed systems security Embedded systems security Intrusion detection Language-based security Malware Metrics Network security Privacy-preserving Resource usage control Security for mobile computing Security models systems Protocol security Secure information flow Security and privacy policies Security architectures System security Usability and security Web security Internet Application and TechnologyInternet Architecture and TechnologiesAnonymity and PrivacyArtificial Intelligence and Expert SystemsNetwork securityBroadband Access TechnologiesApplication AgentsBoundary Issues of Internet SecurityDatabase ManagementData Models for Production Systems and ServicesData ProvenanceDefence SystemsInternet SecurityElectronic votingEmbedded SystemsIPSec Quality of ServiceKnowledge ManagementModeling and verifyingSecurity, Trust and Privacy Self-Organizing Networks Sensor nets and embedded systems Service overlays Switches and switchingTopology characterization and Inference Traffic Measurement and Analysis Traffic Engineering and ControlData SecurityVirtual and Overlay NetworksQuantification of IntegrityInformation SecurityBiometricsChaos-based Data SecurityCryptographyCollaborative LearningCyber Security Congestion control Content DistributionCross Layer Design and Optimization Cyber-physical computing/networkingDistributed Systems SecurityInformation flow monitorLanguage-based securityNetwork Security Issues and ProtocolsSecurity Challenges and Content AuthoringSecure CommunicationsAuthentication TechniquesMANET SecurityWireless Sensor Network SecurityOrganization Considerations in Security PolicyDigital Forensics and CrimesFormulation and ImplementationsGeographic information systems Privacy ProtectionRegulationsQuantitative Information FlowMultimedia and Web ServicesIntelligent Multimedia and its Data ManagementMultimedia Information SystemsMultimedia SecurityWeb DatabasesWeb Metrics and its ApplicationsWeb Mining including Web Intelligence and Web 3.0.XML and other extensible languagesSemantic Web and OntologyWeb services and performanceSecured Database Systems Security in Data Mining Defence SystemsVirtual RealityHardware-Based SecurityTrust and trust managementElectronic SocietyTrust, Privacy and Data SecurityAnonymity, Pseudonymity, and Unlinkabilitydata Correlation and Leakage AttacksPrivacy Enhancing TechnologiesWireless PrivacyUser ProfilingInformation Dissemination ControlDynamic vs. Static Flow-Sensitive Security AnalysisNetwork SecurityAd hoc Mobile Networks SecurityAddressing and Location Management Broadband Access Technologies Blended Internet Security Methods Boundary Issues of Internet SecurityCapacity PlanningCellular and Broadband Wireless NetsFormal verification of privacy for RFID systemsOptical NetworksMiddleware Support for NetworkingMobility Models and SystemsMulticast and Anycast Multimedia Protocols and Networking Network Applications and Services Network Architectures Network Simulation and Emulation Novel Network Architectures Network and Protocol ArchitecturesPeer-to-Peer Communications Performance Evaluation Power Control and Management Protocols and Standards Resource Allocation and ManagementWireless Mesh Networks and ProtocolsUbi/Cloud ComputingAuthentication and Access Control for Data Protection in Ubi/Cloud ComputingContext-Awareness and its Data Mining for UbiComData GridsDistributed Information SystemsForensic in Ubi-comHuman-Computer Interface and Interaction for UbiComUbiquitous SystemsUSN/RFID ServiceSmart Homes and its Business Model for UbiCom ServiceSecurity and its Data Management for UbiComPeer to Peer Data ManagementNew Novel Mechanism and Application for Ubi/Cloud ComputingDelay/disruption tolerant networks End Users Enabling Technologies for the InternetImplementation and Experimental TestbedsQuality of Service Issues Research in ProgressOngoing Research from Undergraduates, Graduates/Postgraduates and ProfessionalsFuture Internet Design and ApplicationsPanel DiscussionProposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.The proposal must include:? Title? Panel Chair(s) (if necessary)? Speakers Name, Affiliation and Email? Scope ? Objective and motivationThe WorldCIS-2012 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before January 31, 2012. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the WorldCIS-2012, please email your proposal to the pandis
worldcis.org Submissions should be in MS Word format.Virtual Presentation (Video Conferencing)We understand that some presenters will not be able to make the trip to Canada to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The WorldCIS-2012 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to papers
worldcis.orgAll the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewed journals.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.