Go Back   Wireless and Wifi Forums > News > Newsgroups > alt.computer.security
Register FAQ Forum Rules Members List Calendar Search Today's Posts Advertise Mark Forums Read

 
Reply
 
LinkBack Thread Tools Display Modes
  #1 (permalink)  
Old 04-14-2010, 04:51 PM
A. Abraham
Guest
 
Posts: n/a
Default IAS 2010 - Second Call for Papers

Apologies for cross-postings.

************************************************** **********************************************
IAS 2010 - Second Call For Papers

The Six International Conference on Information Assurance and Security

August 23-25, 2010 -- Atlanta, GA, USA


http://www.mirlabs.org/ias10/
http://www.mirlabs.net/ias10/

Venue: Georgia Tech Learning Center, Atlanta, GA, USA

Technically Co-sponsored by: IEEE Intelligent Transportation Systems
Society
Publication: By IEEE and fully indexed by IEEE Xplore. Selected papers
presented at the conference will be considered for publication in
special issues of several international Journals.
************************************************** **********************

1. IMPORTANT DATES

* Extended Deadline for workshop proposal: April 30, 2010
* Extended Deadline for submission of full papers: April 30, 2010
* Acceptance notification: May 30, 2010
* Final camera-ready papers due: June 15, 2010

2. SUBMISSION

Link: http://www.edas.info/newPaper.php?c=8622

* A submitted paper should present high-quality and previously
unpublished work, and should not be submitted to other conferences or
journals in the same time.

3. CO-CHAIRS

* General Chairs:
Ashraf Saad, Armstrong Atlantic State University, USA (Email:
ashraf.saad@armstrong.edu)
Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), Europe
(Email: ajith.abraham@ieee.org)
Dharma Agrawal, University of Cincinatti, USA (Email: dpa@cs.uc.edu)

* Program Chairs:
Huirong Fu, Oakland University, USA (Email: fu@oakland.edu)
Daniel Zeng, University of Arizona, USA (Email:
zeng@eller.arizona.edu)
Emilio Corchado, University of Salamanca, Spain (Email:
escorchado@usal.es)

4. SCOPE

Information assurance and security has become an important research
issue in the networked and distributed information sharing
environments. Finding effective ways to protect information systems,
networks and sensitive data within the critical information
infrastructure is challenging even with the most advanced technology
and trained professionals.

The International Conference on Information Assurance and Security
(IAS) aims to bring together researchers, practitioners, developers,
and policy makers involved in multiple disciplines of information
security and assurance to exchange ideas and to learn the latest
development in this important field.

IAS'10 builds on the success of last year's. IAS'09 was held during
August 18-20, 2009 in Xi'ian China and attracted participants from
several countries.

5. CALL FOR REGULAR SESSION PAPERS:

Prospective authors are invited to submit their full-length papers
electronically through the conference website. Each paper should be
concise, but contain sufficient detail and references to allow
critical review. Each paper will be judged by at least three referees.

6. CALL FOR SPECIAL SESSIONS:

The goal of Special Sessions (SS) is to provide a focused discussion
of new or innovative topics. SS organizer(s) must collect at least
five papers. SS papers will be reviewed with the same criteria as
Regular Session papers.

7. TOPICS OF INTEREST

The topics include but are not limited to:

Information Assurance, Security Mechanisms, Methodologies and Models:

Authentication and Identity
Management Authorization and Access Control
Trust Negotiation, Establishment and Management
Anonymity and User Privacy
Data Integrity and Privacy
Network Security
Operating System Security
Database Security
Intrusion Detection
Security Attacks
Security Oriented System Design
Security and Performance trade-off
Security Management and Strategy
Security Verification, Evaluations and Measurements
Secure Software Technologies
New Ideas and Paradigms for Security
Cryptography
Cryptographic Protocols
Key Management and Recovery


Secure System Architectures and Security Application:

Web Services Security
GRID Security
Ubiquitous Computing Security
Mobile Agent Security
Internet Security
Intellectual Property Protection
E-Commerce Security
E-Government Security
E-Health Security
Home System Security
Sensor Network Security
Ad hoc network security
Biometrics Security and Applications
Secure Hardware and Smartcards


Image Engineering, Multimedia Signal Processing and Communication
Security:

Multimedia Security
Multimedia Forensic
Digital Watermarking and DRM
Communication Security
Biometrics
Information Fusion
Image Registration
Image Mosaic

Reply With Quote
Reply


« Re: David H Lipman | In SSL We Trust? Not Lately »
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are Off
[IMG] code is Off
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
TNS 2010: 1st call extension - 30 April 2010 natty2006@gmail.com comp.security.misc 0 04-08-2010 04:09 PM
WAC 2010: 1st call extension - 30 April 2010 natty2006@gmail.com comp.security.misc 0 04-08-2010 04:09 PM
Call for papers: EISWT-10, Orlando, USA, July 2010 James Heralds comp.security.misc 0 02-21-2010 06:15 PM
Call for Papers: PDPTA'10 (The 2010 International Conference onParallel and Distributed Processing Techniques and Applications), USA, July2010 A. M. G. Solo comp.security.misc 0 02-11-2010 11:54 PM
Call for Papers & Sessions: The 2010 International Conference onSecurity and Management (SAM'10), USA, July 2010 A. M. G. Solo comp.security.misc 0 01-13-2010 11:31 PM


All times are GMT. The time now is 10:17 AM.



Powered by vBulletin® Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO 3.6.0 PL2

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45