ICITST-2014. The International Conference for Internet Technology and Secured Transactions

 
ICITST Logo

Technical Co-Sponsored by
IEEE UK/RI Computer Chapter

London Pictures

 

The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)

December 8-10, 2014, London, UK

Free Post-Conference London Tour (Travel Information)

 

 

Notification and Preliminary Call for Papers

The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) is Technical Co-sponsored by IEEE UK/RI Computer Chapter. The ICITST is an international refereed conference dedicated to the advancement of theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.

The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2014 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.

The topics in ICITST-2014 include but are not confined to the following areas:

Internet Application and Technology
  • Internet technologies
  • Internet Architecture
  • Internet of things
  • Broadband Access Technologies
  • Application Agents
  • Boundary Issues of Internet Security
  • Database Management
  • Data Models for Production Systems and Services
  • Artificial Intelligence and Expert Systems
  • IPSec Quality of Service
  • Knowledge Management
  • Embedded Systems
  • Defence Systems

 

Infonomics and e-Technology

  • Infonomics
  • Information Visualization
  • Information Management
  • Information Quality
  • Technology-Enabled Information
  • e-Learning
  • e-Commerce
  • e-Business
  • e-Government
  • e-Society
  • System Design and Security for e-Services
  • Synchronizing e-Security

Cyber warfare and Cyber Security

  • Surveillance Systems
  • Cyber Warfare Trends and Approaches
  • Social engineering
  • Template Protection and Liveliness detection
  • New theories and algorithms in biometrics
  • Formal Methods Application in Security
  • Operating Systems and Database Security
  • nterprise Systems Security
  • SCADA and Embedded systems security
  • Distributed and Pervasive Systems Security
  • Secure Software Development

Information Security

  • Collaborative Learning
  • Trust, Privacy and Data Security
  • Network Security Issues and Protocols
  • Security Challenges and Content Authoring
  • Cryptography
  • Secure Communications
  • Authentication Techniques
  • Chaos-based Data Security
  • MANET Security
  • Wireless Sensor Network Security
  • Organization Considerations in Security Policy Formulation and Implementations
  • Digital Forensics and Crimes
  • Biometrics
  • Cyber Security

Multimedia and Web Services

  • Intelligent Multimedia and its Data Management
  • Multimedia Information Systems
  • Multimedia Security
  • Web Databases
  • Web Metrics and its Applications
  • Web Mining including Web Intelligence and Web 3.0.
  • Web Services
  • XML and other extensible languages
  • Semantic Web and Ontology

Digital Forensic

  • Data leakage and Database forensics
  • Forensics of Virtual and Cloud Environments
  • Network Forensics and Traffic Analysis
  • Information Hiding
  • File System and Memory Analysis
  • Executable Content and Content Filtering
  • Anti-Forensics Techniques
  • Malware forensics
  • Evidentiary Aspects of Digital Forensics
  • Large-Scale Investigations
  • New threats and Non-Traditional approaches
  • Incident Handling and Penetration Testing

Ubi/Cloud Computing

  • Authentication and Access Control for Data Protection in Ubi/Cloud Computing
  • Context-Awareness and its Data Mining for UbiCom
  • Data Grids
  • Distributed Information Systems
  • Human-Computer Interface and Interaction for UbiCom
  • Ubiquitous Systems
  • USN/RFID Service
  • Smart Homes and its Business Model for UbiCom Service
  • Security and Data Management for UbiCom
  • Peer to Peer Data Management
  • New Novel Mechanism and Application for Ubi/Cloud Computing

Cloud Security

  • Secure Virtual Infrastructure and Private Cloud
  • Cryptographic Enforcement of Multi-Tenancy
  • Cloud Requirements for PaaS and SaaS
  • Security Policy and Privacy Requirements
  • CloudAudit Protocol
  • Corporate Governance
  • Laws and Regulations
  • Threats, Vulnerabilities, and Risk Management
  • Disaster Recovery Planning
  • Critical Infrastructure Protection
  • Digital Rights Management
  • Security Policies and Trust Management
  • Identity Management
  • Decidability and Complexity
  • Economics of Security
  • Fraud Management

Research in Progress

  • Ongoing research from undergraduates, graduates/postgraduates and professionals
  • Collaborative Research
  • Future Technologies

Panel Discussion

Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.

Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.

The proposal must include:

  • Title
  • Panel Chair(s) (if necessary)
  • Speakers Name, Affiliation and Email
  • Scope
  • Objective and motivation

The ICITST-2014 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before September 30, 2014. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).

All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the ICITST-2014, please email your proposal to the pandis@icitst.org. Submissions should be in MS Word format.

 

Virtual Presentation (Video Conferencing)

We understand that some presenters will not be able to make the trip to London to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The ICITST-2014 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.

You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to papers@icitst.org

All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewed journals.

 

International Journal of Internet Technology and Secured Transactions (IJITST)International Journal of Business Process Integration and Management (IJBPIM) Journal of Internet Technology and Secured Transactions (JITST)Journal of IT Professional (JITP)International Journal of Web Services Research (JWSR) International Journal for Information Secured (IJISR)

International Journal of Intelligent Computing Research (IJICR)International Journal for Infonomics Applied Soft Computing (ASC)International Journal for Digital Society (IJDS)Computers & Security (CS)Electronic Commerce Research and Applications (ECRA) IEEE Intelligent Systems IEEE

 

 

IEEE Technical

Co-sponsorship

Sponsor

 

Infonomics Society

 

Media Partners

 

Canadian Teacher Magazine
 

 

 

Previous Conference

ICITST-2006

ICITST-2007

ICITST-2008

ICITST-2009

ICITST-2010

ICITST-2011

ICITST-2012

ICITST-2013

ICITST-2014

 

Can your organisation sponsor ICITST? If YES, contact us and your organisation's active logo will be display on this window !

 

 

 

 

 

Copyright © ICITST Privacy Policy