posted by system || 1315 views || tracked by 2 users: [display]

UASS 2009 : The Fourth International Symposium on Ubiquitous Applications and Security Services

FacebookTwitterLinkedInGoogle

Link: http://www.sersc.org/UASS2009
 
When Jan 11, 2009 - Jan 13, 2009
Where Las Vegas, Nevada, USA
Submission Deadline Jun 27, 2008
Notification Due Sep 12, 2008
Categories    security
 

Call For Papers

=========================================================================================
The Fourth International Symposium on
Ubiquitous Applications & Security Services (UASS-09)

January 11-13, 2009, Las Vegas, Nevada, USA

http://www.sersc.org/UASS2009

(In Conjunction with CCNC-09)
http://www.ieee-ccnc.org/
==========================================================================================

==Introduction==
Ubiquitous Computing is emerging rapidly as an exciting new paradigm to provide computing and communication services any time, any where. For realizing ubiquitous computing, UASS are needed.
Our symposium provides a chance for academic and industry professionals to discuss recent progress in the area of ubiquitous computing environment including models and systems, new directions, novel applications associated with the utilization, and acceptance of ubiquitous computing devices and systems.

UASS-09 is a successor of the 1st International Workshop on Ubiquitous Applications & Security Services (UASS-06) (Glasgow, Scotland, UK, May 8-11, 2006), UASS-07 (Kuala Lumpur, Malaysia, August 26-29, 2007), UASS-08 (GinoWan, Okinawa, Japan, March 25-28, 2008).


==Topics (included, but are not limited to)==
* Ubiquitous Applications
- Home-network applications
- Ubiquitous Intelligent Service
- U-business and other applications
- Context awareness Model for Ubiquitous Service
- Intelligent User Interface
- Ubiquitous Sensor Network(USN) / RFID - Issue
- Multimedia Service in U (Ubiquitous)-environment
- U Space (Home, Building, Office)


* Ubiquitous Security
- USN / RFID security
- Ubiquitous Multimedia Security (DRM, IPMP)
- Key management and authentication in U-Environment
- Network security issues and protocols in U-Environment
- Access Control in U-Environment
- Security in U-commerce
- Commercial and industrial security
- IPv6, Forensics for U-Environment
- Others and emerging new topics
- Trusted Computing


* Ubiquitous Embedded Hardware and Sofrware
- Embedded Hardware Support for Ubiquitous
- Embedded Software for Ubiquitous
- Embedded System Architecture for Ubiquitous
- Real-time OS for Ubiquitous
- Smart and Personal devices for Ubiquitous
- Power-Aware computing for Ubiquitous
- Middleware for Ubiquitous
- Specification, Validation and Verification of Embedded System and Software
- New Technologies and Devices for Ubiquitous



==Organization==


Steering Co-Chairs
-------------------
Jong Hyuk Park (Kyungnam University, Korea)
Laurence T. Yang (St Francis Xavier University, Canada)

General Co-chairs
------------------
Hsiao-Hwa Chen (National Cheng Kung University, Taiwan)
Javier Lopez (University of Malaga, Spain)

Program Co-Chairs
-----------------
Justin Zhan (Carnegie Mellon University, USA)
Email: justinzh@andrew.cmu.edu

SeungJin Lim (Utah State University, USA)
Email: lim@cc.usu.edu

Sang-Soo Yeo (BT Networks Co. Ltd., Korea)
Email: ssyeo@msn.com


International Advisory Committee
---------------------------------
Tai-hoon Kim (Hanman University, Korea)
Jianhua Ma (Hosei University, Japan)
Daqing Zhang (GET/INT, France)
Hamid R. Arabnia (The University of Georgia, USA)
Kyo-il Chung (ETRI, Korea)
Han-Chieh Chao (National Ilan University, Taiwan)
M. Atiquzzaman (University of Oklahoma, USA)
Mohammad S. Obaidat (Monmouth University, USA)


Publicity Co-Chairs
--------------------
Guojun Wang (Central South University, P.R.China)
Young-Sik Jeong (Wonkwang University, Korea)
Sheikh Iqbal Ahamed (Marquette University, USA)



Program Committee: TBA
------------------------



==Important Dates==
Papers Submission Due: 27 June, 2008
Acceptance Notification: 12 Sept., 2008
Final Camera Ready Artwork: 10 Oct., 2008



==Submission Guidelines==

Authors MUST submit their manuscripts through the EDAS web site together with a short abstract (approximately 150 words) using the EDAS forms.
Please note that authors must create their own EDAS account before submitting paper(s).
Standard IEEE Transactions templates for Microsoft Word or LaTeX formats can be found by clicking here.
Alternatively you can follow the sample instructions in template pdf by clicking here.
All company clearance and approvals should be obtained prior to submission.
The papers should be no longer than five pages. A cover page should be added and it should include paper title, abstract, list of keywords indicating the paper's topic area (preferably from the list in the Call for Papers page) authors' full names, affiliations and complete addresses, telephone numbers and electronic mail addresses.

Distinguished papers accepted and presented in UASS-09, after further revisions, will be published in special issues on international journals (Pending).


==Contact Information==
For further information regarding the symposium and paper submission, please contact UASS-09 Program Chairs.


- The End of UASS-09 CFP--

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
BIO 2026   8th International Conference on Bioscience & Engineering
AI Security & Privacy 2025   First International Workshop on Artificial Intelligence Security and Privacy
SNLP 2026   7thInternational Conference on Semantic & Natural Language Processing
CBMS 2025 - ST Security and Privacy 2025   CBMS 2025 - Special Track: Security and Privacy in Health Systems: Addressing Technology, Society, and Law
DNLP 2026   7th International Conference on Data Mining and NLP
CCCIoT 2026   7th International Conference on Cloud Computing and IoT