Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    WORLDCIS 2012 - World Congress on Internet Security (WorldCIS-2012)

    View: 2339

    Website www.worldcis.org/ | Want to Edit it Edit Freely

    Category WORLDCIS 2012

    Deadline: January 20, 2012 | Date: June 10, 2012-June 12, 2012

    Venue/Country: Ontario, Canada

    Updated: 2011-10-14 19:00:57 (GMT+9)

    Call For Papers - CFP

    The World Congress on Internet Security (WorldCIS-2012) is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.

    On the ubiquitous networking environments, information is explosively used for various kinds of purposes. From a service perspective, a number of context or ambient aware services are envisaged for "ubiquitous networking" but based on the context security remains an issue.

    The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and and to fostering discussions on information technologies, information systems and globa security applications. The WorldCIS-2012 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation.

    Topics of Interest

    Original papers are invited on recent advances in Internet, Computer Communications and Networking Scuerity. The topics in WorldCIS-2012 include but are not confined to the following areas:

    Access Control

    Accountability

    Anonymity

    Application security

    Attacks and defenses

    Authentication

    Censorship and censorship-resistance

    Distributed systems security

    Embedded systems security

    Intrusion detection

    Language-based security

    Malware

    Metrics

    Network security

    Privacy-preserving

    Resource usage control

    Security for mobile computing

    Security models

    systems Protocol security

    Secure information flow

    Security and privacy policies

    Security architectures

    System security

    Usability and security

    Web security

    Internet Application and Technology

    Internet Architecture and Technologies

    Anonymity and Privacy

    Artificial Intelligence and Expert Systems

    Network security

    Broadband Access Technologies

    Application Agents

    Boundary Issues of Internet Security

    Database Management

    Data Models for Production Systems and Services

    Data Provenance

    Defence SystemsInternet Security

    Electronic voting

    Embedded Systems

    IPSec Quality of Service

    Knowledge Management

    Modeling and verifying

    Security, Trust and Privacy

    Self-Organizing Networks

    Sensor nets and embedded systems

    Service overlays

    Switches and switching

    Topology characterization and Inference

    Traffic Measurement and Analysis

    Traffic Engineering and Control

    Data Security

    Virtual and Overlay Networks

    Quantification of Integrity

    Information Security

    Biometrics

    Chaos-based Data Security

    Cryptography

    Collaborative Learning

    Cyber Security Congestion control

    Content Distribution

    Cross Layer Design and Optimization

    Cyber-physical computing/networking

    Distributed Systems Security

    Information flow monitor

    Language-based security

    Network Security Issues and Protocols

    Security Challenges and Content Authoring

    Secure Communications

    Authentication Techniques

    MANET Security

    Wireless Sensor Network Security

    Organization Considerations in Security Policy

    Digital Forensics and Crimes

    Formulation and Implementations

    Geographic information systems

    Privacy Protection

    Regulations

    Quantitative Information Flow

    Multimedia and Web Services

    Intelligent Multimedia and its Data Management

    Multimedia Information Systems

    Multimedia Security

    Web Databases

    Web Metrics and its Applications

    Web Mining including Web Intelligence and Web 3.0.

    XML and other extensible languages

    Semantic Web and Ontology

    Web services and performance

    Secured Database Systems

    Security in Data Mining

    Defence Systems

    Virtual Reality

    Hardware-Based Security

    Trust and trust management

    Electronic Society

    Trust, Privacy and Data Security

    Anonymity, Pseudonymity, and Unlinkability

    data Correlation and Leakage Attacks

    Privacy Enhancing Technologies

    Wireless Privacy

    User Profiling

    Information Dissemination Control

    Dynamic vs. Static Flow-Sensitive Security Analysis

    Network Security

    Ad hoc Mobile Networks Security

    Addressing and Location Management

    Broadband Access Technologies

    Blended Internet Security Methods

    Boundary Issues of Internet Security

    Capacity Planning

    Cellular and Broadband Wireless Nets

    Formal verification of privacy for RFID systems

    Optical Networks

    Middleware Support for Networking

    Mobility Models and Systems

    Multicast and Anycast

    Multimedia Protocols and Networking

    Network Applications and Services

    Network Architectures

    Network Simulation and Emulation

    Novel Network Architectures

    Network and Protocol Architectures

    Peer-to-Peer Communications

    Performance Evaluation

    Power Control and Management

    Protocols and Standards

    Resource Allocation and Management

    Wireless Mesh Networks and Protocols

    Ubi/Cloud Computing

    Authentication and Access Control for Data Protection in Ubi/Cloud Computing

    Context-Awareness and its Data Mining for UbiCom

    Data Grids

    Distributed Information Systems

    Forensic in Ubi-com

    Human-Computer Interface and Interaction for UbiCom

    Ubiquitous Systems

    USN/RFID Service

    Smart Homes and its Business Model for UbiCom Service

    Security and its Data Management for UbiCom

    Peer to Peer Data Management

    New Novel Mechanism and Application for Ubi/Cloud Computing

    Delay/disruption tolerant networks

    End Users

    Enabling Technologies for the Internet

    Implementation and Experimental Testbeds

    Quality of Service Issues

    Research in Progress

    Ongoing Research from Undergraduates, Graduates/Postgraduates and Professionals

    Future Internet Design and Applications

    Panel Discussion

    Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.

    Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.

    The proposal must include:

    ? Title

    ? Panel Chair(s) (if necessary)

    ? Speakers Name, Affiliation and Email

    ? Scope

    ? Objective and motivation

    The WorldCIS-2012 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before January 31, 2012. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).

    All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the WorldCIS-2012, please email your proposal to the pandisatworldcis.org Submissions should be in MS Word format.

    Virtual Presentation (Video Conferencing)

    We understand that some presenters will not be able to make the trip to Canada to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The WorldCIS-2012 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.

    You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to papersatworldcis.org

    All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewed journals.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.