IAS 2010 - Second Call for Papers

Discussion in 'Computer Security' started by A. Abraham, Apr 14, 2010.

  1. A. Abraham

    A. Abraham Guest

    Apologies for cross-postings.

    ************************************************************************************************
    IAS 2010 - Second Call For Papers

    The Six International Conference on Information Assurance and Security

    August 23-25, 2010 -- Atlanta, GA, USA


    http://www.mirlabs.org/ias10/
    http://www.mirlabs.net/ias10/

    Venue: Georgia Tech Learning Center, Atlanta, GA, USA

    Technically Co-sponsored by: IEEE Intelligent Transportation Systems
    Society
    Publication: By IEEE and fully indexed by IEEE Xplore. Selected papers
    presented at the conference will be considered for publication in
    special issues of several international Journals.
    ************************************************************************

    1. IMPORTANT DATES

    * Extended Deadline for workshop proposal: April 30, 2010
    * Extended Deadline for submission of full papers: April 30, 2010
    * Acceptance notification: May 30, 2010
    * Final camera-ready papers due: June 15, 2010

    2. SUBMISSION

    Link: http://www.edas.info/newPaper.php?c=8622

    * A submitted paper should present high-quality and previously
    unpublished work, and should not be submitted to other conferences or
    journals in the same time.

    3. CO-CHAIRS

    * General Chairs:
    Ashraf Saad, Armstrong Atlantic State University, USA (Email:
    )
    Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), Europe
    (Email: )
    Dharma Agrawal, University of Cincinatti, USA (Email: )

    * Program Chairs:
    Huirong Fu, Oakland University, USA (Email: )
    Daniel Zeng, University of Arizona, USA (Email:
    )
    Emilio Corchado, University of Salamanca, Spain (Email:
    )

    4. SCOPE

    Information assurance and security has become an important research
    issue in the networked and distributed information sharing
    environments. Finding effective ways to protect information systems,
    networks and sensitive data within the critical information
    infrastructure is challenging even with the most advanced technology
    and trained professionals.

    The International Conference on Information Assurance and Security
    (IAS) aims to bring together researchers, practitioners, developers,
    and policy makers involved in multiple disciplines of information
    security and assurance to exchange ideas and to learn the latest
    development in this important field.

    IAS'10 builds on the success of last year's. IAS'09 was held during
    August 18-20, 2009 in Xi'ian China and attracted participants from
    several countries.

    5. CALL FOR REGULAR SESSION PAPERS:

    Prospective authors are invited to submit their full-length papers
    electronically through the conference website. Each paper should be
    concise, but contain sufficient detail and references to allow
    critical review. Each paper will be judged by at least three referees.

    6. CALL FOR SPECIAL SESSIONS:

    The goal of Special Sessions (SS) is to provide a focused discussion
    of new or innovative topics. SS organizer(s) must collect at least
    five papers. SS papers will be reviewed with the same criteria as
    Regular Session papers.

    7. TOPICS OF INTEREST

    The topics include but are not limited to:

    Information Assurance, Security Mechanisms, Methodologies and Models:

    Authentication and Identity
    Management Authorization and Access Control
    Trust Negotiation, Establishment and Management
    Anonymity and User Privacy
    Data Integrity and Privacy
    Network Security
    Operating System Security
    Database Security
    Intrusion Detection
    Security Attacks
    Security Oriented System Design
    Security and Performance trade-off
    Security Management and Strategy
    Security Verification, Evaluations and Measurements
    Secure Software Technologies
    New Ideas and Paradigms for Security
    Cryptography
    Cryptographic Protocols
    Key Management and Recovery


    Secure System Architectures and Security Application:

    Web Services Security
    GRID Security
    Ubiquitous Computing Security
    Mobile Agent Security
    Internet Security
    Intellectual Property Protection
    E-Commerce Security
    E-Government Security
    E-Health Security
    Home System Security
    Sensor Network Security
    Ad hoc network security
    Biometrics Security and Applications
    Secure Hardware and Smartcards


    Image Engineering, Multimedia Signal Processing and Communication
    Security:

    Multimedia Security
    Multimedia Forensic
    Digital Watermarking and DRM
    Communication Security
    Biometrics
    Information Fusion
    Image Registration
    Image Mosaic
    A. Abraham, Apr 14, 2010
    #1
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. A. Abraham

    IAS 2010 - Call for Papers

    A. Abraham, Feb 2, 2010, in forum: Computer Security
    Replies:
    0
    Views:
    1,997
    A. Abraham
    Feb 2, 2010
  2. A. Abraham

    IAS 2010 - Call for Papers

    A. Abraham, Feb 14, 2010, in forum: Computer Security
    Replies:
    0
    Views:
    1,284
    A. Abraham
    Feb 14, 2010
  3. James Heralds
    Replies:
    0
    Views:
    860
    James Heralds
    Feb 21, 2010
  4. James Heralds

    Call for papers: ISP-10, Orlando, USA, July 2010

    James Heralds, Feb 21, 2010, in forum: Computer Security
    Replies:
    0
    Views:
    1,169
    James Heralds
    Feb 21, 2010
  5. A. Abraham

    IAS 2010 - Final Call for Papers

    A. Abraham, May 5, 2010, in forum: Computer Security
    Replies:
    0
    Views:
    1,270
    A. Abraham
    May 5, 2010
Loading...

Share This Page