Difference between revisions of "UCSS 2008"
(modified through wikirestore by Th) |
(modified through wikirestore by orapi) |
||
(5 intermediate revisions by 2 users not shown) | |||
Line 6: | Line 6: | ||
| Camera ready = | | Camera ready = | ||
| Acronym= UCSS 2008 | | Acronym= UCSS 2008 | ||
− | | End date= 2008 | + | | End date= 2008-11-16 |
| Series= | | Series= | ||
| Type = Conference | | Type = Conference | ||
Line 12: | Line 12: | ||
| State = GB/ENG | | State = GB/ENG | ||
| City = GB/ENG/London | | City = GB/ENG/London | ||
+ | | Year = 2008 | ||
| Homepage= www.comp.dit.ie/ubisec2008 | | Homepage= www.comp.dit.ie/ubisec2008 | ||
− | | Start date= 2008 | + | | Start date= 2008-11-13 |
| Title = Ubiquitous Computing Security Systems | | Title = Ubiquitous Computing Security Systems | ||
− | | wikicfpId= 3386}} | + | | wikicfpId= 3386 |
+ | }} | ||
==Ubiquitous Computing Security Systems (UCSS 2008)== | ==Ubiquitous Computing Security Systems (UCSS 2008)== |
Latest revision as of 03:05, 6 December 2021
Event Rating
median | worst |
---|---|
List of all ratings can be found at UCSS 2008/rating
UCSS 2008 | |
---|---|
Ubiquitous Computing Security Systems
| |
Dates | 2008-11-13 (iCal) - 2008-11-16 |
Homepage: | www.comp.dit.ie/ubisec2008 |
Location | |
Location: | GB/ENG/London, GB/ENG, GB |
Important dates | |
Abstracts: | Jul 25, 2008 |
Submissions: | Jul 25, 2008 |
Notification: | Aug 10, 2008 |
Table of Contents | |
Ubiquitous Computing Security Systems (UCSS 2008)
Call For Papers
haj mohsen oon rooz too daaftr arz kardam ke bayatzanjani.ir mal man baz nemishe shoma goftin baz mishe baz oomadam shab baz kardam bazam baz nashod hala didin man harfam dorost bood.albate harfe shoma ham roo cheshme ma ja dare.jesarat nashe ye vaght
Important Dates
Paper submission deadline: July 25, 2008 (extended deadline) Notification of Paper acceptance: August 10, 2008 Camera-ready paper submission: Aug 31, 2008
Topics of Interest
- Privacy concerns in Ubiquitous Computing Systems
- Trust concerns in Ubiquitous Computing Systems
- Design principles of secure context-aware applications
- Adaptation of secure input and output to the situation
- How does security address the legal and ethical issues in emerging ubiquitous computing systems?
- Tools and techniques for designing, developing, implementing, and evaluating ubiquitous computing systems
- Challenges in building secure Ubiquitous Computing Systems for health, academic institutions, and other applications
Workshop Venue
Hosted by the Third International Conference on Digital Information Management (ICDIM 2008), November 13-16 2008, University of East London, London, UK.
Submission
Please refer to the Call for Papers for author guidelines. Submissions can be sent directly to Dr. Fred Mtenzi
Program Co-Chairs
Fredrick Mtenzi, Dublin Institute of Technology, Ireland Charles Shoniregun, University of East London, UK
Program Committee
- Daniel MacCormac, Dublin Institute of Technology, Ireland
- Inncocent Ngalinda, Institute of Finance Management, Tanzania
- Emmanuel Mkusa, Namibia University, Namibia
- Tom Dowling, Claude Shannon Institute, Ireland
- Kudakwashe Dube, Dublin Institute of Technology, Ireland
- Mike Jackson, Birmingham City University, UK
This CfP was obtained from WikiCFP