Difference between revisions of "UCSS 2008"
(modified through wikirestore by Th) |
(modified through wikirestore by Th) |
||
Line 1: | Line 1: | ||
{{Event | {{Event | ||
+ | | Acronym = UCSS 2008 | ||
+ | | Title = Ubiquitous Computing Security Systems | ||
+ | | Type = Conference | ||
+ | | Series = | ||
| Field = Computer security and reliability | | Field = Computer security and reliability | ||
+ | | Homepage = www.comp.dit.ie/ubisec2008 | ||
+ | | Start date = Nov 13, 2008 | ||
+ | | End date = Nov 16, 2008 | ||
+ | | City= London | ||
+ | | State = | ||
+ | | Country = UK | ||
| Abstract deadline = Jul 25, 2008 | | Abstract deadline = Jul 25, 2008 | ||
| Submission deadline = Jul 25, 2008 | | Submission deadline = Jul 25, 2008 | ||
| Notification = Aug 10, 2008 | | Notification = Aug 10, 2008 | ||
− | | Camera ready = | + | | Camera ready = |
− | + | |wikicfpId=3386}} | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Ubiquitous Computing Security Systems (UCSS 2008)== | ==Ubiquitous Computing Security Systems (UCSS 2008)== |
Revision as of 23:30, 24 October 2021
Event Rating
median | worst |
---|---|
List of all ratings can be found at UCSS 2008/rating
UCSS 2008 | |
---|---|
Ubiquitous Computing Security Systems
| |
Dates | Nov 13, 2008 (iCal) - Nov 16, 2008 |
Homepage: | www.comp.dit.ie/ubisec2008 |
Location | |
Location: | London, UK |
Important dates | |
Abstracts: | Jul 25, 2008 |
Submissions: | Jul 25, 2008 |
Notification: | Aug 10, 2008 |
Table of Contents | |
Ubiquitous Computing Security Systems (UCSS 2008)
Call For Papers
haj mohsen oon rooz too daaftr arz kardam ke bayatzanjani.ir mal man baz nemishe shoma goftin baz mishe baz oomadam shab baz kardam bazam baz nashod hala didin man harfam dorost bood.albate harfe shoma ham roo cheshme ma ja dare.jesarat nashe ye vaght
Important Dates
Paper submission deadline: July 25, 2008 (extended deadline) Notification of Paper acceptance: August 10, 2008 Camera-ready paper submission: Aug 31, 2008
Topics of Interest
- Privacy concerns in Ubiquitous Computing Systems
- Trust concerns in Ubiquitous Computing Systems
- Design principles of secure context-aware applications
- Adaptation of secure input and output to the situation
- How does security address the legal and ethical issues in emerging ubiquitous computing systems?
- Tools and techniques for designing, developing, implementing, and evaluating ubiquitous computing systems
- Challenges in building secure Ubiquitous Computing Systems for health, academic institutions, and other applications
Workshop Venue
Hosted by the Third International Conference on Digital Information Management (ICDIM 2008), November 13-16 2008, University of East London, London, UK.
Submission
Please refer to the Call for Papers for author guidelines. Submissions can be sent directly to Dr. Fred Mtenzi
Program Co-Chairs
Fredrick Mtenzi, Dublin Institute of Technology, Ireland Charles Shoniregun, University of East London, UK
Program Committee
- Daniel MacCormac, Dublin Institute of Technology, Ireland
- Inncocent Ngalinda, Institute of Finance Management, Tanzania
- Emmanuel Mkusa, Namibia University, Namibia
- Tom Dowling, Claude Shannon Institute, Ireland
- Kudakwashe Dube, Dublin Institute of Technology, Ireland
- Mike Jackson, Birmingham City University, UK
This CfP was obtained from WikiCFP