posted by user: sj1st || 550 views || tracked by 1 users: [display]

IWCS 2011 : The 1st FTRA International Workshop on Convergence Security in Pervasive Environments (IWCS 2011)

FacebookTwitterLinkedInGoogle

Link: http://www.ftrai.org/iwcs2011
 
When Jun 28, 2011 - Jun 30, 2011
Where Crete, Greece
Submission Deadline Mar 6, 2011
Notification Due Mar 12, 2011
Final Version Due Apr 1, 2011
 

Call For Papers

[IWCS 2011 Call for Papers]

===============================================================================
** Important Notices **

1. Submission due: Mar. 6, 2011 (Extended)

2. All accepted papers will be published in the Springer CCIS proceedings (EI and ISTP),
which will be indexed by the following services: EI Compendex(Since 2010),
ISI Conference Proceedings Citation Index - Science (CPCI-S),
included in ISI Web of Science, DBLP and Scopus.

3. All accepted and presented papers in IWCS 2011, after further revisions,
will be published in the special issues of the following international journals:

- IJDWM, IGI-Gobal (SCI-E), http://www.igi-global.com/ijdwm
- The Computer Jorunal, Oxford University Press (SCI-E), http://comjnl.oxfordjournals.org/
- SCN, Wiley InterScience (SCIE), http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122
- IJITCC, InderScience, http://www.inderscience.com/ijitcc
- JoC, FTRA Publishing, http://www.ftrai.org/joc
- JIPS, KIPS (KCI-E index) http://jips-k.org

===============================================================================

The 1st FTRA International Workshop on Convergence Security in
Pervasive Environments (IWCS 2011)

Crete, Greece, June 28 - 30, 2011

http://www.ftrai.org/iwcs2011

===============================================================================

Overview
--------------------------------------
A recent emerging issue in information technology is the convergence of different kinds of applications. Convergence brings a user-centric environment to

provide computing and communication services. In order to realize IT advantages, it requires the integration of security and data management to be suitable for

pervasive computing environments. However, there are still many problems and major challenges waiting for us to solve such as the security risks in convergence

application, which could appear when devices interact with different kinds of applications. Therefore, we need to explore convergence security in pervasive

environments.

IWCS 2011 addresses the various theories and practical applications of convergence security in pervasive environments. It will present important results of

significant value in order to improve application services and solve various problems within the scope of IWCS 2011. In addition, we expect it will trigger

further related research and technology developments that will improve our lives in the future.

Another area that must be considered in the convergence of different security services in pervasive environments is the Internet of Things (IoT). There are

many definitions of the IoT, but all of them revolve around the same central concept: a world-wide network of interconnected objects. It is to be expected that

the elements of a pervasive environment will greatly benefit from Internet connectivity, as pervasive devices will be able to interact with external entities

by obtaining services or even by providing them. However, it is necessary to address how the different security mechanisms used in the local pervasive

environment could interact with protocols and mechanisms (e.g. secure web services) that allow secure collaboration with remote entities. Considering that the

security of the IoT is a topic that is currently being considered a priority by many different industrial, commercial and governmental actors, the secure

convergence of this new paradigm with pervasive environments is a potential research field that will be taken into account in our workshop.

Topic of Interest
-----------------------------------------
- Trust and Reputation Management in Pervasive Computing
- Security Applications and Services in Pervasive Computing
- Security Model for Pervasive Computing
- Intelligent Multimedia Security Services in Pervasive Computing
- Key Management and Authentication in Pervasive Computing
- Network Security Issues and Protocols in Pervasive Computing
- Access Control and Privacy Protection in Pervasive Computing
- Security Standard for Next Pervasive Computing
- Security in Human Centred Environments
- Natural Interfaces Security Issues
- Advanced Multimodal Interfaces
- Human Oriented Interfaces
- Multimodal Mobile and Ubiquitous Services
- Methods for Multimodal Integration
- Middleware Services for Multimodal and Pervasive Applications
- Context-Awareness in Multimodal Applications
- Multimodal Analysis and Recognition of Contex
- Next Ubiquitous and Immersive Environments
- Virtual Reality and Ubiquitous Computing
- Usability and Accessibility in Ubiquitous Applications
- Applications and Scenarios
- Wireless Applications
- Pervasive Computing Applications
- Wireless Multimedia Applications
- Others: Commercial or Industrial Issue in Pervasive Computing
- Secure collaboration between pervasive environments through the Internet
- Protecting the integration of pervasive environment with the Internet of Things


Paper Submission
-----------------------------------------
There will be a combination of presentations including scientific papers. Prospective authors are invited, in the first instance, to submit papers for oral

presentations in any of the areas of interest for this workshop.
Authors should submit a paper with 4-6 pages in length(Max. 8 pages, extra charges for two pages) by using online systems for review.

All accepted papers will be published in the Springer CCIS proceedings (EI and ISTP), which will be indexed by the following services:

EI Compendex(Since 2010), ISI Conference Proceedings Citation Index - Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus.

For more detail, please refer STA 2011 site (URL: http://www.ftrai.org/sta2011/Proceedings.html)

Submission URL: http://www.editorialsystem.net/iwcs2011



Important Dates
-----------------------------------------
Paper Submission Deadline: Mar. 6, 2011 (Extended)
Paper Status Notification: Mar. 12, 2011
Camera-ready Due: April 1, 2011
Conference events: June 28 - 30, 2011


Contact
-----------------------------------------
If you have any questions about the CFPs and papers submission, please email to
Prof. Jose A. Onieva (onieva@lcc.uma.es) and
Dr. Kyusuk Han (hankyusuk@kaist.ac.kr).


==General Chairs==
Jose A. Onieva, University of Malaga, Spain
Charalabos Skianis, University of Aegean, Greece

==Program Chairs==
Kyusuk Han, KAIST, Korea
Rodrigo Roman Castro, University of Malaga, Spain

==Publicity Co-chairs==
Christos Xenakis, University of Piraeus, Greece
Eleni Darra, University of Piraeus, Greece
Evangelos Rekleitis, University of Piraeus, Greece

==Program Committee==
Alexander De Luca, Ludwig-Maximilians-Universitat, Germany
Anthony H.M. Chung, University of Lancaster, UK
Antonio Jara, University of Murcia, Spain
Chan Yeun Yeob, Khalifa University of Science Technology and Research, UAE
Damien Sauveron, XLIM, University of Limoges, France
Deok Gyu Lee, ETRI, Korea
Fabio Martinelli, Information Security Group, IIT-CNR, Italy
Florian Michahelles, ETH Zurich, Switzerland
Florina Almenárez, University Carlos III of Madrid, Spain
Han-You Jeong, Pusan University, Korea
Hyohyun Choi, Inha Technical College, Korea
Isaac Agudo, Universidad de Malaga, Spain
Jae-il Lee, KISA, Korea
Javier Lopez, Computer Science Department, University of Malaga, Spain
Jeong Hyun Yi, Soongsil University, Korea
Jongsub Moon, Korea University, Korea
Jordi Herrera Joancomarti Open University of Catalonia, Spain
Jose A. Montes Universidad de Málaga, Spain
Levente Buttyan BME, Hungary
Magdalena Payeras-Capella University of the Balearic Islands, Spain
Manik Lal Das Dhirubhai Ambani Inst. for Information and Communication Tech., India
Marc Lacoste France Telecom R&D/Orange Labs, France
María Francisca Hinarejos University of the Balearic Islands, Spain
Mark Billinghurst Univ. of Canterbury, New Zealand
Masoom Alam Institute of Management Sciences(Assistant Professor),Pakistan
Miguel Soriano Universitat Politecnica de Catalunya, Spain
Nicolas Sklavos Tech. Educational Institute of Patras, Greece
Olivier Markowitch ULB, Belgium
Panagiotis Rizomiliotis University of the Aegean, Greece
Pierangela Samarati Department of Information Technologies, University of Milan, Italy
Rodrigo Roman Castro University of Malaga, Spain
Ruben Rios del Pozo University of Malaga, Spain
Sokratis Katsikas Dept. of Technology Education & Digital Systems, University of Piraeus, Greece
Stefanos Gritzalis Info-Sec-Lab, University of the Aegean, Greece
Sunwoong Choi Kookmin University, Korea
Thomas Strang, German Aerospace Center (DLR), Germany
Thomas Wook Choi, Hankuk University of Foreign Studies, Korea
Won Joo Lee, Inha Technical College, Korea
Yong Lee, ChungJu University, Korea

Related Resources

SI: Adaptive HAR in smart spaces 2022   Special issue : Adaptive Human Activity and Behaviour Recognition Models for Context Awareness in Intelligent Environments
Scopus, JCI -- FIEE 2022   MDPI Education Sciences Journal - Special Issue on Digital Twins and Future Intelligent Educational Environments -- Scopus, JCI
SPIoT 2022   The 11th International Symposium on Security and Privacy on the Internet of Things
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
SI on ATD&IS II 2022   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
IEEE PICom 2022   The 20th IEEE International Conference on Pervasive Intelligence and Computing
JMC 2022   JOURNAL OF MATHEMATICAL CRYPTOLOGY