以文本方式查看主题

-  中文XML论坛 - 专业的XML技术讨论区  (http://bbs.xml.org.cn/index.asp)
--  『 理论计算机科学 』  (http://bbs.xml.org.cn/list.asp?boardid=64)
----  【CFP】International Conference for Internet Technology and Secured Transactions 2008 (ICITST 2008)  (http://bbs.xml.org.cn/dispbbs.asp?boardid=64&rootid=&id=58688)


--  作者:michaelzhao
--  发布时间:2/1/2008 6:54:00 AM

--  【CFP】International Conference for Internet Technology and Secured Transactions 2008 (ICITST 2008)
June 23-28, 2008, Dublin, Ireland ([URL=http://www.icitst.org]www.icitst.org[/URL])

Technical In-cooperation pending with [URL=http://www.ieee.org]IEEE[/URL] CS and TCEC

Sponsored by [URL=http://www.infonomics.org.uk]eCI[/URL], [URL=http://www.uel.ac.uk]UEL[/URL] and in cooperation with   [URL=http://www.iap.org.uk]IAP[/URL] [URL=http://www.bcs.org.uk]BCS[/URL] [URL=http://www.iee.org]IEE[/URL] [URL=http://www.stfx.ca]STFX[/URL] [URL=http://www.it-advisory.com]The IT Advisory Group[/URL] [URL=http://www.k-state.edu]KSU[/URL]

Preliminary call for papers


The International Conference for Internet Technology and Secured Transactions
(ICITST-2008) is an international refereed conference dedicated to the
advancement of the theory and practical implementation of secured Internet
transactions and to fostering discussions on information technology
evolution. ICITST aims to provide a highly professional and comparative
academic research forum that promotes collaborative excellence between
academia and industry.

The objectives of ICITST-2008 are to bridge the knowledge gap between
academia and industry, promote research esteem in secured Internet
transactions and the importance of information technology evolution to
secured transactions. ICITST-2008 invites and welcomes research papers that
encompass conceptual analysis, design implementation and performance
evaluation.


Topics of Interest


The coverage of ICITST-2008 includes, but is not limited to, the following
subjects:

*    Application of agents
*    Application security
*    Blended Internet security methods
*    Biometrics
*    Boundary issues of Internet security
*    Broadband access technologies
*    Challenges of content authoring
*    Data mining security
*    E-society
*    Globalisation of information society
*    Government, and corporate Internet security policy
*    Internet architecture
*    Infonomics
*    IPSec quality of services
*    Patentability
*    Regulation, self-regulation, and co-regulation
*    Web services
*    Secured database systems
*    Synchronising e-security
*    Technology-enabled information
*    Trust, privacy, and data security
*    Wireless transactions


Proceedings


All papers accepted for the conference, including special sessions papers,
will be published in the proceedings. The Proceedings of the International
Conference for Internet Technology and Secured Transactions (ICITST-2008)
will be published by the e-Centre for Infonomics in a book (CD) with ISBN
0-9546628-2-2.


Best Paper Award


Author(s) of best paper will receive one of ICITST-2008 awards and
certificate of achievement and contribution to research within the subject
area of the paper.


Important Dates


Paper submissions


28 February 2008 - paper submission
15 March  2008- notification of acceptance
31 March 2008 - final paper submission


Poster submissions


15 February 2008 - poster submission
15 March 2008 - notification of acceptance
31 March 2008 - final poster submission


Conference Venue


Dublin Institute of technology, Dublin, Ireland


--  作者:silver191
--  发布时间:2/18/2008 9:24:00 PM

--  
不被任何索引收录?
--  作者:michaelzhao
--  发布时间:2/18/2008 10:32:00 PM

--  
以下是引用silver191在2008-2-18 21:24:00的发言:
不被任何索引收录?

你好

Proceedings


All papers accepted for the conference, including special sessions papers,
will be published in the proceedings. The Proceedings of the International
Conference for Internet Technology and Secured Transactions (ICITST-2008)
will be published by the e-Centre for Infonomics in a book (CD) with ISBN
0-9546628-2-2.


W 3 C h i n a ( since 2003 ) 旗 下 站 点
苏ICP备05006046号《全国人大常委会关于维护互联网安全的决定》《计算机信息网络国际联网安全保护管理办法》
46.875ms