posted by user: jsalazar || 4737 views || tracked by 12 users: [display]

IAS 2011 : International Conference on Information Assurance and Security

FacebookTwitterLinkedInGoogle


Conference Series : Information Assurance and Security
 
Link: http://www.mirlabs.org/ias11/
 
When Dec 5, 2011 - Dec 8, 2011
Where Malacca, Malaysia
Submission Deadline Jul 1, 2011
Notification Due Aug 15, 2011
Final Version Due Oct 10, 2011
 

Call For Papers

7th International Conference on Information Assurance and Security (IAS'11)
Melaka, Malaysia
December 5-8, 2011

WWW: http://www.mirlabs.org/ias11
http://www.mirlabs.net/ias11 (mirror site)
http://www.mirlabs.org/ias10 (past event)


Technically Sponsored by:
-------------------------------------
IEEE Intelligent Transportation System Society (pending approval)
IEEE Systems, Man and Cybernetics Society (SMCS) -Spain Chapter


Publication: IEEE
-------------------------

Objective:
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. The International Symposium on Information Assurance and Security (IAS) aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field.

Topics:

** Information Assurance, Security Mechanisms, Methodologies and Models **

Authentication and Identity
Management Authorization and Access Control
Trust Negotiation, Establishment and Management
Anonymity and User Privacy
Data Integrity and Privacy
Network Security
Operating System Security
Database Security
Intrusion Detection
Security Attacks
Security Oriented System Design
Security and Performance trade-off
Security Management and Strategy
Security Verification, Evaluations and Measurements
Secure Software Technologies
New Ideas and Paradigms for Security
Cryptography
Cryptographic Protocols
Key Management and Recovery


** Secure System Architectures and Security Application **

Web Services Security
Grid Security
Ubiquitous Computing Security
Mobile Agent Security
Internet Security
Intellectual Property Protection
E-Commerce Security
E-Government Security
E-Health Security
Home System Security
Sensor Network Security
Ad hoc network security
Biometrics Security and Applications
Secure Hardware and Smartcards


** Image Engineering, Multimedia Signal Processing and Communication Security **

Multimedia Security
Multimedia Forensic
Digital Watermarking and DRM
Communication Security
Biometrics
Information Fusion
Image Registration
Image Mosaic
Image Indexing and Retrieval
Image and Video Coding
Multiscale Geometric Analysis
Motion Detection and Tracing
Feature Extraction
3G Communication
Embedded System Design


Author Guidelines:
--------------------------
Submission of paper should be made through the submission link: https://www.easychair.org/account/signin.cgi?conf=ias11
Please refer to the conference website for guidelines to prepare your manuscript. All accepted papers will be compiled in conference proceedings published by the IEEE. It is mandatory at least an author registers for every paper that is included in the conference proceedings. Proceedings will be made available during the conference.


Important Dates:
------------------------
Deadline for Paper Submission: July 1, 2011
Notification for Acceptance: August 15, 2011
Camera ready submission and author registration :October 10, 2011


Call for Workshops and Special Sessions
------------------------------------------------------------

IAS 2011 is seeking original high quality Special Sessions and Workshops on focused discussion addressing innovative research highlighting significant topics and emerging issues which are related to the conference theme and with the desired expertise. Interdisciplinary session themes are strongly sought after. Each special session resembles a mini-conference within the main IAS meeting will run throughout the conference in parallel to other tracks (except the keynote presentations).


Important Dates:
------------------------
Deadline for Special Session Proposal Submission : April 30, 2011
Deadline for Workshop Proposal Submission : April 30, 2011
Notification for Acceptance(Special Session and Workshop): May 15, 2011


IAS 2011 Organizing team:
---------------------------------------------

General Chairs
Ajith Abraham, MIR Labs, Europe
Daniel Zeng, University of Arizona, USA
Dharma Agrawal, University of Cincinatti, USA

Program Chairs
Mohd Faizal Abdollah, UTeM, Malaysia
Emilio Corchado, University of Salamanca, Spain
Valentina Casola, University of Napoli Federico I, Italy


Information Contact:
----------------------------

- Mohd Faizal Abdollah, UTeM, Malaysia

- Azah Kamilah Muda (azahkm@gmail.com)

Related Resources

SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
ICCDA--Ei 2023   2023 The 7th International Conference on Compute and Data Analysis (ICCDA 2023)
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
SI-KM4LAW 2023   Journal Special Issue KNOWLEDGE MANAGEMENT FOR LAW in Computer Law and Security Review
ICCSN 2023   IEEE--2023 15th International Conference on Communication Software and Networks (ICCSN 2023)
CoMSE 2023   2023 International Conference on Materials Science and Engineering (CoMSE 2023)
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications