Venue: London

Location: London, United Kingdom

Event Date/Time: Nov 09, 2009 End Date/Time: Nov 12, 2009
Early Registration Date: May 31, 2009
Abstract Submission Date: Apr 30, 2009
Paper Submission Date: May 31, 2009
Report as Spam


The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.


Additional Information

The objectives of The ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2009 invites research papers that encompass conceptual analysis, design implementation and performance evaluation. The topics in ICITST-2009 include but are not confined to the following areas: * Application of agents * Application security * Blended Internet security methods * Biometrics * Boundary issues of Internet security * Broadband access technologies * Challenges of content authoring * Data mining security * E-society * Globalisation of information society * Government, and corporate Internet security policy * Internet architecture * Infonomics * IPSec quality of services * Patentability * Regulation, self-regulation, and co-regulation Web services * Secured database systems * Synchronising e-security * Technology-enabled information * Trust, privacy, and data security * Wireless transactions * Context-Awareness and its Data mining for Ubi-com service * Human-Computer Interface and Interaction for Ubi-com * Smart Homes and its business model for Ubi-com service * Intelligent Multimedia Service and its Data management for Ubi-com * USN / RF-ID for Ubi-com service * Network security issues, protocols, data security in Ubi-com * Database protection for Ubi-com * Privacy Protection and Forensic in Ubi-com * Multimedia Security in Ubi-com * Quality of Service Issues * Authentication and Access control for data protection in Ubi-com * Information visualization * Web services * Service, Security and its Data management for U-commerce * New novel mechanism and Applications for Ubi-com * Information Management * Multimedia Information Systems * Information Retrieval * Natural Language Processing * Digital Libraries * Data and Information Quality Management * Data Grids, Data and Information Quality * Database Management * Web Databases * Temporal and Spatial Databases * Data Mining * Web Mining including Web Intelligence and Web 3.0 * E-Learning, eCommerce, e-Business and e-Government * Web Metrics and its applications * XML and other extensible languages * Semantic Web and Ontology * Human-Computer Interaction * Artificial Intelligence and Expert Systems * Knowledge Management * Ubiquitous Systems * Peer to Peer Data Management * Interoperability * Mobile Data Management * Data Models for Production Systems and Services * Data Exchange issues and Supply Chain * Data Life Cycle in Products and Processes * Case Studies on Data Management, Monitoring and Analysis * Security and Access Control * Information Content Security * Mobile, Ad Hoc and Sensor Network Security * Distributed information systems