The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)

Country: United Kingdom

City: London

Abstr. due: 15.09.2014

Dates: 08.12.14 — 10.12.14

Area Of Sciences: Law; Computer science;

Organizing comittee e-mail: info@icitst.org

Organizers: Inomics Society

 

The International Conference for Internet Technology and Secured Transactions (ICITST-2014) is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.

The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2014 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.

The topics in ICITST-2014 include but are not confined to the following areas:
Internet Application and Technology

    Internet technologies
    Internet Architecture
    Internet of things
    Broadband Access Technologies
    Application Agents
    Boundary Issues of Internet Security
    Database Management
    Data Models for Production Systems and Services
    Artificial Intelligence and Expert Systems
    IPSec Quality of Service
    Knowledge Management
    Embedded Systems
    Defence Systems

 

Infonomics and e-Technology

    Infonomics
    Information Visualization
    Information Management
    Information Quality
    Technology-Enabled Information
    e-Learning
    e-Commerce
    e-Business
    e-Government
    e-Society
    System Design and Security for e-Services
    Synchronizing e-Security

Cyber warfare and Cyber Security

    Surveillance Systems
    Cyber Warfare Trends and Approaches
    Social engineering
    Template Protection and Liveliness detection
    New theories and algorithms in biometrics
    Formal Methods Application in Security
    Operating Systems and Database Security
    nterprise Systems Security
    SCADA and Embedded systems security
    Distributed and Pervasive Systems Security
    Secure Software Development

   
Information Security

    Collaborative Learning
    Trust, Privacy and Data Security
    Network Security Issues and Protocols
    Security Challenges and Content Authoring
    Cryptography
    Secure Communications
    Authentication Techniques
    Chaos-based Data Security
    MANET Security
    Wireless Sensor Network Security
    Organization Considerations in Security Policy Formulation and Implementations
    Digital Forensics and Crimes
    Biometrics
    Cyber Security

Multimedia and Web Services

    Intelligent Multimedia and its Data Management
    Multimedia Information Systems
    Multimedia Security
    Web Databases
    Web Metrics and its Applications
    Web Mining including Web Intelligence and Web 3.0.
    Web Services
    XML and other extensible languages
    Semantic Web and Ontology

Digital Forensic

    Data leakage and Database forensics
    Forensics of Virtual and Cloud Environments
    Network Forensics and Traffic Analysis
    Information Hiding
    File System and Memory Analysis
    Executable Content and Content Filtering
    Anti-Forensics Techniques
    Malware forensics
    Evidentiary Aspects of Digital Forensics
    Large-Scale Investigations
    New threats and Non-Traditional approaches
    Incident Handling and Penetration Testing

   
Ubi/Cloud Computing

    Authentication and Access Control for Data Protection in Ubi/Cloud Computing
    Context-Awareness and its Data Mining for UbiCom
    Data Grids
    Distributed Information Systems
    Human-Computer Interface and Interaction for UbiCom
    Ubiquitous Systems
    USN/RFID Service
    Smart Homes and its Business Model for UbiCom Service
    Security and Data Management for UbiCom
    Peer to Peer Data Management
    New Novel Mechanism and Application for Ubi/Cloud Computing

Cloud Security

    Secure Virtual Infrastructure and Private Cloud
    Cryptographic Enforcement of Multi-Tenancy
    Cloud Requirements for PaaS and SaaS
    Security Policy and Privacy Requirements
    CloudAudit Protocol
    Corporate Governance
    Laws and Regulations
    Threats, Vulnerabilities, and Risk Management
    Disaster Recovery Planning
    Critical Infrastructure Protection
    Digital Rights Management
    Security Policies and Trust Management
    Identity Management
    Decidability and Complexity
    Economics of Security
    Fraud Management

Research in Progress

    Ongoing research from undergraduates, graduates/postgraduates and professionals
    Collaborative Research
    Future Technologies
 

Conference Web-Site: http://www.icitst.org/