Saturday, May 14, 2011

[DMANET] Call for Papers: ICITST-2011

Apologies for cross-postings. Please send it to interested colleagues
and students. Thanks!


The 6th International Conference for Internet Technology and Secured
Transactions (ICITST-2011)
December 11-14, 2011, Abu Dhabi, UAE (

The 6th International Conference for Internet Technology and Secured
Transactions (ICITST-2011) is Technical Co-sponsored by IEEE UAE
Computer Chapter. The ICITST is an international refereed conference
dedicated to the advancement of the theory and practical implementation
of secured Internet transactions and to fostering discussions on
information technology evolution. The ICITST aims to provide a highly
professional and comparative academic research forum that promotes
collaborative excellence between academia and industry.

The objectives of the ICITST are to bridge the knowledge gap between
academia and industry, promote research esteem in secured Internet
transactions and the importance of information technology evolution to
secured transactions. The ICITST-2011 invites research papers that
encompass conceptual analysis, design implementation and performance

All the accepted papers will appear in the proceedings published by IEEE
and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.

The topics in ICITST-2011 include but are not confined to the following

Internet Application and Technology

Internet technologies
Internet Architecture
Internet of things
Broadband Access Technologies
Application Agents
Boundary Issues of Internet Security
Database Management
Data Models for Production Systems and Services
Artificial Intelligence and Expert Systems
IPSec Quality of Service
Knowledge Management
Embedded Systems
Defence Systems

Infonomics and e-Technology

Information Visualization
Information Management
Information Quality
Technology-Enabled Information
System Design and Security for e-Services
Synchronizing e-Security

Information Security

Collaborative Learning
Trust, Privacy and Data Security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Secure Communications
Authentication Techniques
Chaos-based Data Security
MANET Security
Wireless Sensor Network Security
Organization Considerations in Security Policy Formulation and
Digital Forensics and Crimes
Cyber Security

Multimedia and Web Services

Intelligent Multimedia and its Data Management
Multimedia Information Systems
Multimedia Security
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0.
Web Services
XML and other extensible languages
Semantic Web and Ontology

Ubi/Cloud Computing

Authentication and Access Control for Data Protection in Ubi/Cloud
Context-Awareness and its Data Mining for UbiCom
Data Grids
Distributed Information Systems
Human-Computer Interface and Interaction for UbiCom
Ubiquitous Systems
USN/RFID Service
Smart Homes and its Business Model for UbiCom Service
Security and its Data Management for UbiCom
Peer to Peer Data Management
New Novel Mechanism and Application for Ubi/Cloud Computing

Research in Progress

Ongoing research from undergraduates, graduates/postgraduates and
Collaborative Research

Important dates

Full Paper Submission Date June 30, 2011
Extended Abstract (Work in Progress) Submission Date July 31, 2011
Proposal for Workshops and Tutorials May 31, 2011
Notification of Workshop and Tutorial Acceptance June 05, 2011
Proposal for Industrial Presentation April 30, 2011
Notification of Extended Abstract Acceptance/Rejection August 15, 2011
Notification of Industrial Presentation Acceptance May 10, 2011
Notification of Paper Acceptance/Rejection July 31, 2011
Camera Ready Extended Abstract Due August 31, 2011
Camera Ready Paper Due August 15, 2011
Early Registration Deadline (Authors only) May 01 to September
30, 2011
Late Registration Deadline (Authors only) October 01 to November
15, 2011
Participants Registration May 01 to December 01, 2011
Conference Dates December 11-14, 2011

For more information please contact:

* Contributions to be spread via DMANET are submitted to
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.