<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=ks_c_5601-1987">
<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:"Malgun Gothic";
        panose-1:2 11 5 3 2 0 0 2 0 4;}
@font-face
        {font-family:"Malgun Gothic";
        panose-1:2 11 5 3 2 0 0 2 0 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        text-align:justify;
        text-justify:inter-ideograph;
        text-autospace:none;
        word-break:break-hangul;
        font-size:10.0pt;
        font-family:"Malgun Gothic";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Malgun Gothic";
        color:windowtext;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-family:"Malgun Gothic";}
/* Page Definitions */
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:3.0cm 72.0pt 72.0pt 72.0pt;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=KO link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span lang=EN-US>[STA 2011 Call for Papers]<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>===============================================================================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>** Important Notices **<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>1. Submission due: March 10, 2011<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>2. All accepted papers will bepublished in the Springer CCIS and/or LNCS proceedings (Confirmed) <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> (EI and ISTP), which will be indexed by the following services: EI Compendex(Since 2010), <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> ISI Conference Proceedings Citation Index - Science (CPCI-S), <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> included in ISI Web of Science, DBLP and Scopus.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>3. All accepted and presented papers in STA 2011, after further revisions, <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>will be published in the special issues of the following international journals:<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US> - IJDWM, IGI-Gobal (SCI-E), http://www.igi-global.com/ijdwm<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - The Computer Jorunal, Oxford University Press (SCI-E), http://comjnl.oxfordjournals.org/<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - SCN, Wiley InterScience (SCIE), http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - IJITCC, InderScience, http://www.inderscience.com/ijitcc<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - JoC, FTRA Publishing, http://www.ftrai.org/joc<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> - JIPS, KIPS (KCI-E index) http://jips-k.org<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>===============================================================================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US> The 8th FTRA International Conference on <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> Secure and Computing, data management, and Applications (STA 2011)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US> Crete, Greece, June 28 - 30, 2011<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US> http://www.ftrai.org/sta2011<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>===============================================================================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>*******************************************************************************************************<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>All accepted papers will bepublished in the Springer CCIS and/or LNCS proceedings (Confirmed) (EI and ISTP), which will be indexed by the following services: <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>EI Compendex(Since 2010), ISI Conference Proceedings Citation Index - Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Distinguished papers accepted and presented in STA-11, after further revisions, will be published in the special issues of the following international journals <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>: <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>International Journal of Data Warehousing and Mining - IGI-Gobal (SCI-E)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>The Computer Jorunal - Oxford University Press (SCI-E)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Security and Communication Networks - Wiley InterScience (SCIE)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>International Journal of Information Technology, Communications and Convergence (IJITCC) - Inderscience<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Journal of Convergence (JoC) - FTRA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Journal of Information Processing Systems (JIPS) - KIPS (KCIE)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>*******************************************************************************************************<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>STA 2011 Overview<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>=================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Information technology issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>In order to realize IT advantages, it requires integrating security and data management to be suitable for future computing environments. However, there are <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>still many problems and major challenges waiting for us to solve such as the security risks in resource sharing, which could be occurred when data resources <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>are connected and accessed by anyone. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Therefore, it will be needed to explore more secure and trust and intelligent data management mechanism.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>STA 2011 addresses the various theories and practical applications of secure and trust computing and data management in future environments. It will present <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>important results of significant value to solve the application services and various problems within the scope of STA 2011. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held as SSDU-10(Xi'an, China, 2010), <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>SSDU-08(Kunming, China, 2008), SSDU-07(Nanjing, China, 2007), UC-Sec 09(Las Vegas, USA, 2009) and TRUST-08(Shanghai, China, 2008), TRUST-07(Taipei, Taiwan, <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>2007), TRUST-06(Seoul, Korea, 2006).<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Topics<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>=========================================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>The conference includes, but is not limited to, the areas listed below: <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>[Security and Trust computing] <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>- Authentication and access control <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Anonymity, identity management <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cryptographic protocols <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Data integrity, dependability <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Digital right management and intellectual property protection <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Accountability <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Applied cryptography <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cybercrime and computer forensics <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Denial of service attacks <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Formal methods in security <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Information warfare <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Steganography and watermarking <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Intrusion tolerance <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- System and network security <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Multimedia security <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Smartphone security issues <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Security for open convergence system <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Security for M2M platform <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Security and privacy issues for intelligent vehicular systems and communications <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Security issues for broadband convergence network <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- IPTV security services <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Privacy-enhancing technology <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Security evaluation and management <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Security requirements engineering <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- trust models and trust management policies <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Mobile trusted computing <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Trustworthy infrastructures and services for cloud computing <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cryptographic aspects of trusted computing <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Establishing trust in embedded systems <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Virtualization for trusted platforms <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Verification of trusted computing architectures <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>[Data management] <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>- Data and information modelling <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Data and information networks <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Data structures and data management algorithms <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Data warehousing <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Distributed, parallel, P2P, and Grid-based databases <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Pervasive data and information <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Semantic web and ontologies <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Sensor data management <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- WWW, XML, and databases <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Context-awareness and data mining <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Human-computer interface and interaction <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Smart homes / building and business model <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Intelligent multimedia services <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Smart sensor / RFID <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Intelligent pervasive computing <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Electronic / ubiquitous commerce and services <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Engineering information systems <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Enterprise data management / resource Planning <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Geographic information systems <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Mobile computing and data management <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- System design and implementation using data management <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- New novel mechanism and applications <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Cluster technologies <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Grid and cloud domputing <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Community and collaborative computing networks <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Support for autonomic grid infrastructure <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Resource management <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Grid-based problem solving environments <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- System design and implementation using data management <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- New novel mechanism and applications <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Important Dates<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>===================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Workshop Proposal Due: Nov. 15, 2010<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Paper Submission Deadline: March 10, 2011 (Hard Deadline)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Paper Status Notification: April 5, 2011<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Camera-ready Due: April 23, 2010<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Conference events: June 28 - 30, 2011 <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Submission and Proceeding<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>==========================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>All accepted papers will bepublished in the Springer CCIS and/or LNCS proceedings (Confirmed) (EI and ISTP), which will be indexed by the following services: <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>EI Compendex(Since 2010), ISI Conference Proceedings Citation Index - Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Instructions for papers in the Springer's LNCS/CCIS</span>£¨<span lang=EN-US>Note that the paper format of CCIS is the same as that of LNCS</span>£©<span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Prepare your paper in the exact format as the sample paper for LNCS/CCIS. Failure to do so may result in the exclusion of your paper from the proceedings. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Please read the authors' instructions carefully before preparing your papers. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Springer accepts both Microsoft Word and LaTex format in the Lecture Note Series. However, FTRA does not accept the use of LaTex. Therefore, you should use <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>the Microsoft Word instead of using LaTex (The paper will be excluded from the proceeding if you use LaTex). Springer provides the relevant templates and <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>sample files for both PC (sv-lncs.dot) and Mac (sv-lncs) environments. <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Please download word.zip at: http://www.springer.com/cda/content/document/cda_downloaddocument/word.zip?SGWID=0-0-45-72919-0.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> If you need more help on preparing your papers, please visit Springer's LNCS web page at: http://www.springer.com/computer/lncs?SGWID=0-164-2-72376-0.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Submission system: <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>[Security and Trust computing] http://www.editorialsystem.net/sta11/stc<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> [Data management] http://www.editorialsystem.net/sta11/dm<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Distinguished papers accepted and presented in STA-11, after further revisions, will be published in the special issues of the following international journals <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>:<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US> * International Journal of Data Warehousing and Mining - IGI-Gobal (SCI-E)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> * The Computer Jorunal - Oxford University Press (SCI-E)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> * Security and Communication Networks - Wiley InterScience (SCIE)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US> * International Journal of Information Technology, Communications and Convergence (IJITCC) - Inderscience<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> * Journal of Convergence (JoC) - FTRA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> * Journal of Information Processing Systems (JIPS) - KIPS (KCIE)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Call for Workshops <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>======================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>We encourage researches to submit their workshop proposals (according to the guidelines available at STA-11 web site) to workshop chairs with the subject<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>" STA-11 WORKSHOP PROPOSAL [-- pls. select the part==> 1) Security part (2)data management part]&quot.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>[Security and Trust computing part]<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Jean-Marc Seigneur, University of Geneva, Switzerland, jean-marc.seigneur@unige.ch<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Panagiotis Rizomiliotis, University of the Aegean, Greece, prizomil@aegean.gr<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>[Data management part]<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Roland R. Wagner, University of Linz, Austria, rwagner@faw.uni-linz.ac.at<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Xiaofang Zhou, The University of Queensland, Australia, zxf@itee.uq.edu.au<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>http://www.ftrai.org/sta2011/Workshops.html <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Financial Support for Workshop Organizer:<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>If a workshop were organized successfully, the organizer (1 organizer per 1 workshop) will get:<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> * At least 8 papers registration: Free registration<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> * At least 16 papers registration: Free registration and Free accommodation (Max. 2 nights). <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Important Dates -----------------------------------------------<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>November 15, 2010 Workshop Proposal Submission Due<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>November 30, 2010 Workshop Acceptance Notification<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>April 23, 2011 Camera-ready paper due<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>June 28 - 30, 2011 Conference events<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Organization <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>======================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Steering Chair<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>James J. (Jong Hyuk) Park, Seoul National University of Science and Technology, Korea<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US> <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>General Chairs<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>David Chadwick, University of Kent, UK<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Javier Lopez, University of Malaga, Spain<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Sang-Soo Yeo, Mokwon University, Korea<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>General Vice-chair<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Changhoon Lee, Hanshin University, Korea <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Program Chairs<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>[Security and Trust Computing Track]<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Taeshik Shon, Samsung Electronics, Korea<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Lambrinoudakis Costas, University of the Aegean, Greece<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>[Data Management Track]<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>David Taniar, Monash University, Australia<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Andreas Wombacher, University of Twente, The Netherlands <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Workshop Chairs<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>[Security and Trust Computing Track]<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Jean-Marc Seigneur, University of Geneva, Switzerland<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Panagiotis Rizomiliotis, University of the Aegean, Greece<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>[Data Management Track]<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Roland R. Wagner, University of Linz, Austria<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Xiaofang Zhou, The University of Queensland, Australia <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>International Advisory Board<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Bart Preneel, Katholieke Universiteit Leuven, Belgium<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Gail-Joon Ahn, Arizona State University, USA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Wanlei Zhou, Deakin University, Australia<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Stefanos Gritzalis, University of the Aegean, Greece<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Feng Bao, Institute for Infocomm Research (I2R), Singapore<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Xiaobo Zhou, University of Colorado at Colorado Springs, USA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Tok Wang LING, National University of Singapore, Singapore<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Philip S. Yu, University of Illinois at Chicago, USA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Publicity Chairs<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Sotiris Ioannidis, Foundation for Research and Technology, Greece<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Jong-Hyouk Lee, INRIA, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Andreas Wombacher, University of Twente, The Netherlands<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Deqing Zou, Huazhong University of Science andTechnology, China<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Lei Shu, Osaka University, Japan<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Sang Yep Nam, Kookje College, Korea <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>International Liaison Chairs<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Guojun Wang, Central South University, P. R. China<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Bernady O. Apduhan, Kyushu Sangyo University, Japan<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Jongsung Kim, Kyungnam University, Korea<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Muhammad Khurram Khan, King Saud University, Saudi Arabia<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Contact Information<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>====================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>If you have any questions about the CfP and papers submission, <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>please email to Prof. Sang-Soo Yeo (sangsooyeo@gmail.com) and Dr. TS Shon (743zh2k@gmail.com).<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>-The End-<o:p></o:p></span></p></div></body></html>