Difference between revisions of "UCSS 2008"
(Event created) |
|||
Line 17: | Line 17: | ||
}} | }} | ||
− | + | ==Ubiquitous Computing Security Systems (UCSS 2008)== | |
− | + | ||
− | + | * http://www.comp.dit.ie/ubisec2008 | |
− | Ubiquitous Computing Security Systems (UCSS 2008) | ||
− | |||
− | |||
+ | ==Call For Papers== | ||
− | + | ==Theme== | |
− | Theme | ||
This workshop will bring together researchers and industry participants who are involved with the design, development, and implementation of novel secure ubiquitous applications which can be used in heterogeneous computer systems and mobile devices. | This workshop will bring together researchers and industry participants who are involved with the design, development, and implementation of novel secure ubiquitous applications which can be used in heterogeneous computer systems and mobile devices. | ||
Line 32: | Line 29: | ||
In the last few years we have witnessed a significant increase in the use of the computers and mobile devices in Ubiquitous Computing Systems. While this is a welcome trend, security concerns are becoming one of the major problems. It is affecting the adoption rate and usage of these systems. Unless deliberate efforts are taken to secure these systems from design to implementation most of development achieved to date may not be realised and rolled out to the real world. | In the last few years we have witnessed a significant increase in the use of the computers and mobile devices in Ubiquitous Computing Systems. While this is a welcome trend, security concerns are becoming one of the major problems. It is affecting the adoption rate and usage of these systems. Unless deliberate efforts are taken to secure these systems from design to implementation most of development achieved to date may not be realised and rolled out to the real world. | ||
− | Important Dates | + | ==Important Dates== |
Paper submission deadline: July 25, 2008 (extended deadline) | Paper submission deadline: July 25, 2008 (extended deadline) | ||
Line 38: | Line 35: | ||
Camera-ready paper submission: Aug 31, 2008 | Camera-ready paper submission: Aug 31, 2008 | ||
− | Topics of Interest | + | ==Topics of Interest== |
− | + | * Privacy concerns in Ubiquitous Computing Systems | |
− | + | * Trust concerns in Ubiquitous Computing Systems | |
− | + | * Design principles of secure context-aware applications | |
− | + | * Adaptation of secure input and output to the situation | |
− | + | * How does security address the legal and ethical issues in emerging ubiquitous computing systems? | |
− | + | * Tools and techniques for designing, developing, implementing, and evaluating ubiquitous computing systems | |
− | + | * Challenges in building secure Ubiquitous Computing Systems for health, academic institutions, and other applications | |
− | Workshop Venue | + | ==Workshop Venue== |
Hosted by the Third International Conference on Digital Information Management (ICDIM 2008), November 13-16 2008, University of East London, London, UK. | Hosted by the Third International Conference on Digital Information Management (ICDIM 2008), November 13-16 2008, University of East London, London, UK. | ||
− | Submission | + | ==Submission== |
Please refer to the Call for Papers for author guidelines. | Please refer to the Call for Papers for author guidelines. | ||
Line 58: | Line 55: | ||
− | Program Co-Chairs | + | ==Program Co-Chairs== |
Fredrick Mtenzi, Dublin Institute of Technology, Ireland | Fredrick Mtenzi, Dublin Institute of Technology, Ireland | ||
Line 64: | Line 61: | ||
− | Program Committee | + | ==Program Committee== |
− | Daniel MacCormac, Dublin Institute of Technology, Ireland | + | * [[has PC member::Daniel MacCormac]], Dublin Institute of Technology, Ireland |
− | Inncocent Ngalinda, Institute of Finance Management, Tanzania | + | * [[has PC member::Inncocent Ngalinda]], Institute of Finance Management, Tanzania |
− | Emmanuel Mkusa, Namibia University, Namibia | + | * [[has PC member::Emmanuel Mkusa]], Namibia University, Namibia |
− | Tom Dowling, Claude Shannon Institute, Ireland | + | * [[has PC member::Tom Dowling]], Claude Shannon Institute, Ireland |
− | Kudakwashe Dube, Dublin Institute of Technology, Ireland | + | * [[has PC member::Kudakwashe Dube]], Dublin Institute of Technology, Ireland |
− | Mike Jackson, Birmingham City University, UK | + | * [[has PC member::Mike Jackson]], Birmingham City University, UK |
− | + | This CfP was obtained from [http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=3386&copyownerid=1194 WikiCFP][[Category:Ubiquitous computing]] | |
[[Category:Ubiquitous computing]] | [[Category:Ubiquitous computing]] |
Revision as of 17:08, 8 November 2008
UCSS 2008 | |
---|---|
Ubiquitous Computing Security Systems
| |
Dates | Nov 13, 2008 (iCal) - Nov 16, 2008 |
Homepage: | www.comp.dit.ie/ubisec2008 |
Location | |
Location: | London, UK |
Loading map... | |
Important dates | |
Abstracts: | Jul 25, 2008 |
Submissions: | Jul 25, 2008 |
Notification: | Aug 10, 2008 |
Table of Contents | |
Ubiquitous Computing Security Systems (UCSS 2008)
Call For Papers
Theme
This workshop will bring together researchers and industry participants who are involved with the design, development, and implementation of novel secure ubiquitous applications which can be used in heterogeneous computer systems and mobile devices.
In the last few years we have witnessed a significant increase in the use of the computers and mobile devices in Ubiquitous Computing Systems. While this is a welcome trend, security concerns are becoming one of the major problems. It is affecting the adoption rate and usage of these systems. Unless deliberate efforts are taken to secure these systems from design to implementation most of development achieved to date may not be realised and rolled out to the real world.
Important Dates
Paper submission deadline: July 25, 2008 (extended deadline) Notification of Paper acceptance: August 10, 2008 Camera-ready paper submission: Aug 31, 2008
Topics of Interest
- Privacy concerns in Ubiquitous Computing Systems
- Trust concerns in Ubiquitous Computing Systems
- Design principles of secure context-aware applications
- Adaptation of secure input and output to the situation
- How does security address the legal and ethical issues in emerging ubiquitous computing systems?
- Tools and techniques for designing, developing, implementing, and evaluating ubiquitous computing systems
- Challenges in building secure Ubiquitous Computing Systems for health, academic institutions, and other applications
Workshop Venue
Hosted by the Third International Conference on Digital Information Management (ICDIM 2008), November 13-16 2008, University of East London, London, UK.
Submission
Please refer to the Call for Papers for author guidelines. Submissions can be sent directly to Dr. Fred Mtenzi
Program Co-Chairs
Fredrick Mtenzi, Dublin Institute of Technology, Ireland Charles Shoniregun, University of East London, UK
Program Committee
- Daniel MacCormac, Dublin Institute of Technology, Ireland
- Inncocent Ngalinda, Institute of Finance Management, Tanzania
- Emmanuel Mkusa, Namibia University, Namibia
- Tom Dowling, Claude Shannon Institute, Ireland
- Kudakwashe Dube, Dublin Institute of Technology, Ireland
- Mike Jackson, Birmingham City University, UK
This CfP was obtained from WikiCFP
Abstract deadline | July 25, 2008 + |
Acronym | UCSS 2008 + |
End date | November 16, 2008 + |
Event type | Conference + |
Has PC member | Daniel MacCormac +, Inncocent Ngalinda +, Emmanuel Mkusa +, Tom Dowling +, Kudakwashe Dube + and Mike Jackson + |
Has coordinates | 51° 30' 26", -0° 7' 40"Latitude: 51.507322222222 Longitude: -0.12764722222222 + |
Has location city | London + |
Has location country | Category:UK + |
Homepage | http://www.comp.dit.ie/ubisec2008 + |
IsA | Event + |
Notification | August 10, 2008 + |
Start date | November 13, 2008 + |
Submission deadline | July 25, 2008 + |
Title | Ubiquitous Computing Security Systems + |