[STA 2011 Call for Papers] =============================================================================== ** Important Notices ** 1. Submission due: March 10, 2011 2. All accepted papers will bepublished in the Springer CCIS and/or LNCS proceedings (Confirmed) (EI and ISTP), which will be indexed by the following services: EI Compendex(Since 2010), ISI Conference Proceedings Citation Index - Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus. 3. All accepted and presented papers in STA 2011, after further revisions, will be published in the special issues of the following international journals: - IJDWM, IGI-Gobal (SCI-E), http://www.igi-global.com/ijdwm - The Computer Jorunal, Oxford University Press (SCI-E), http://comjnl.oxfordjournals.org/ - SCN, Wiley InterScience (SCIE), http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122 - IJITCC, InderScience, http://www.inderscience.com/ijitcc - JoC, FTRA Publishing, http://www.ftrai.org/joc - JIPS, KIPS (KCI-E index) http://jips-k.org =============================================================================== The 8th FTRA International Conference on Secure and Computing, data management, and Applications (STA 2011) Crete, Greece, June 28 - 30, 2011 http://www.ftrai.org/sta2011 =============================================================================== ******************************************************************************************************* All accepted papers will bepublished in the Springer CCIS and/or LNCS proceedings (Confirmed) (EI and ISTP), which will be indexed by the following services: EI Compendex(Since 2010), ISI Conference Proceedings Citation Index - Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus. Distinguished papers accepted and presented in STA-11, after further revisions, will be published in the special issues of the following international journals : International Journal of Data Warehousing and Mining - IGI-Gobal (SCI-E) The Computer Jorunal - Oxford University Press (SCI-E) Security and Communication Networks - Wiley InterScience (SCIE) International Journal of Information Technology, Communications and Convergence (IJITCC) - Inderscience Journal of Convergence (JoC) - FTRA Journal of Information Processing Systems (JIPS) - KIPS (KCIE) ******************************************************************************************************* STA 2011 Overview ================= Information technology issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services. In order to realize IT advantages, it requires integrating security and data management to be suitable for future computing environments. However, there are still many problems and major challenges waiting for us to solve such as the security risks in resource sharing, which could be occurred when data resources are connected and accessed by anyone. Therefore, it will be needed to explore more secure and trust and intelligent data management mechanism. STA 2011 addresses the various theories and practical applications of secure and trust computing and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of STA 2011. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held as SSDU-10(Xi'an, China, 2010), SSDU-08(Kunming, China, 2008), SSDU-07(Nanjing, China, 2007), UC-Sec 09(Las Vegas, USA, 2009) and TRUST-08(Shanghai, China, 2008), TRUST-07(Taipei, Taiwan, 2007), TRUST-06(Seoul, Korea, 2006). Topics ========================================= The conference includes, but is not limited to, the areas listed below: [Security and Trust computing] - Authentication and access control - Anonymity, identity management - Cryptographic protocols - Data integrity, dependability - Digital right management and intellectual property protection - Accountability - Applied cryptography - Cybercrime and computer forensics - Denial of service attacks - Formal methods in security - Information warfare - Steganography and watermarking - Intrusion tolerance - System and network security - Multimedia security - Smartphone security issues - Security for open convergence system - Security for M2M platform - Security and privacy issues for intelligent vehicular systems and communications - Security issues for broadband convergence network - IPTV security services - Privacy-enhancing technology - Security evaluation and management - Security requirements engineering - trust models and trust management policies - Mobile trusted computing - Trustworthy infrastructures and services for cloud computing - Cryptographic aspects of trusted computing - Establishing trust in embedded systems - Virtualization for trusted platforms - Verification of trusted computing architectures [Data management] - Data and information modelling - Data and information networks - Data structures and data management algorithms - Data warehousing - Distributed, parallel, P2P, and Grid-based databases - Pervasive data and information - Semantic web and ontologies - Sensor data management - WWW, XML, and databases - Context-awareness and data mining - Human-computer interface and interaction - Smart homes / building and business model - Intelligent multimedia services - Smart sensor / RFID - Intelligent pervasive computing - Electronic / ubiquitous commerce and services - Engineering information systems - Enterprise data management / resource Planning - Geographic information systems - Mobile computing and data management - System design and implementation using data management - New novel mechanism and applications - Cluster technologies - Grid and cloud domputing - Community and collaborative computing networks - Support for autonomic grid infrastructure - Resource management - Grid-based problem solving environments - System design and implementation using data management - New novel mechanism and applications Important Dates =================== Workshop Proposal Due: Nov. 15, 2010 Paper Submission Deadline: March 10, 2011 (Hard Deadline) Paper Status Notification: April 5, 2011 Camera-ready Due: April 23, 2010 Conference events: June 28 - 30, 2011 Submission and Proceeding ========================== All accepted papers will bepublished in the Springer CCIS and/or LNCS proceedings (Confirmed) (EI and ISTP), which will be indexed by the following services: EI Compendex(Since 2010), ISI Conference Proceedings Citation Index - Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus. Instructions for papers in the Springer's LNCS/CCIS£¨Note that the paper format of CCIS is the same as that of LNCS£© - Prepare your paper in the exact format as the sample paper for LNCS/CCIS. Failure to do so may result in the exclusion of your paper from the proceedings. Please read the authors' instructions carefully before preparing your papers. - Springer accepts both Microsoft Word and LaTex format in the Lecture Note Series. However, FTRA does not accept the use of LaTex. Therefore, you should use the Microsoft Word instead of using LaTex (The paper will be excluded from the proceeding if you use LaTex). Springer provides the relevant templates and sample files for both PC (sv-lncs.dot) and Mac (sv-lncs) environments. - Please download word.zip at: http://www.springer.com/cda/content/document/cda_downloaddocument/word.zip?SGWID=0-0-45-72919-0. If you need more help on preparing your papers, please visit Springer's LNCS web page at: http://www.springer.com/computer/lncs?SGWID=0-164-2-72376-0. Submission system: [Security and Trust computing] http://www.editorialsystem.net/sta11/stc [Data management] http://www.editorialsystem.net/sta11/dm Distinguished papers accepted and presented in STA-11, after further revisions, will be published in the special issues of the following international journals : * International Journal of Data Warehousing and Mining - IGI-Gobal (SCI-E) * The Computer Jorunal - Oxford University Press (SCI-E) * Security and Communication Networks - Wiley InterScience (SCIE) * International Journal of Information Technology, Communications and Convergence (IJITCC) - Inderscience * Journal of Convergence (JoC) - FTRA * Journal of Information Processing Systems (JIPS) - KIPS (KCIE) Call for Workshops ====================== We encourage researches to submit their workshop proposals (according to the guidelines available at STA-11 web site) to workshop chairs with the subject " STA-11 WORKSHOP PROPOSAL [-- pls. select the part==> 1) Security part (2)data management part]". [Security and Trust computing part] Jean-Marc Seigneur, University of Geneva, Switzerland, jean-marc.seigneur@unige.ch Panagiotis Rizomiliotis, University of the Aegean, Greece, prizomil@aegean.gr [Data management part] Roland R. Wagner, University of Linz, Austria, rwagner@faw.uni-linz.ac.at Xiaofang Zhou, The University of Queensland, Australia, zxf@itee.uq.edu.au http://www.ftrai.org/sta2011/Workshops.html Financial Support for Workshop Organizer: If a workshop were organized successfully, the organizer (1 organizer per 1 workshop) will get: * At least 8 papers registration: Free registration * At least 16 papers registration: Free registration and Free accommodation (Max. 2 nights). Important Dates ----------------------------------------------- November 15, 2010 Workshop Proposal Submission Due November 30, 2010 Workshop Acceptance Notification April 23, 2011 Camera-ready paper due June 28 - 30, 2011 Conference events Organization ====================== Steering Chair James J. (Jong Hyuk) Park, Seoul National University of Science and Technology, Korea General Chairs David Chadwick, University of Kent, UK Javier Lopez, University of Malaga, Spain Sang-Soo Yeo, Mokwon University, Korea General Vice-chair Changhoon Lee, Hanshin University, Korea Program Chairs [Security and Trust Computing Track] Taeshik Shon, Samsung Electronics, Korea Lambrinoudakis Costas, University of the Aegean, Greece [Data Management Track] David Taniar, Monash University, Australia Andreas Wombacher, University of Twente, The Netherlands Workshop Chairs [Security and Trust Computing Track] Jean-Marc Seigneur, University of Geneva, Switzerland Panagiotis Rizomiliotis, University of the Aegean, Greece [Data Management Track] Roland R. Wagner, University of Linz, Austria Xiaofang Zhou, The University of Queensland, Australia International Advisory Board Bart Preneel, Katholieke Universiteit Leuven, Belgium Gail-Joon Ahn, Arizona State University, USA Wanlei Zhou, Deakin University, Australia Stefanos Gritzalis, University of the Aegean, Greece Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan Feng Bao, Institute for Infocomm Research (I2R), Singapore Xiaobo Zhou, University of Colorado at Colorado Springs, USA Tok Wang LING, National University of Singapore, Singapore Philip S. Yu, University of Illinois at Chicago, USA Publicity Chairs Sotiris Ioannidis, Foundation for Research and Technology, Greece Jong-Hyouk Lee, INRIA, France Andreas Wombacher, University of Twente, The Netherlands Deqing Zou, Huazhong University of Science andTechnology, China Lei Shu, Osaka University, Japan Sang Yep Nam, Kookje College, Korea International Liaison Chairs Guojun Wang, Central South University, P. R. China Bernady O. Apduhan, Kyushu Sangyo University, Japan Jongsung Kim, Kyungnam University, Korea Muhammad Khurram Khan, King Saud University, Saudi Arabia Contact Information ==================== If you have any questions about the CfP and papers submission, please email to Prof. Sang-Soo Yeo (sangsooyeo@gmail.com) and Dr. TS Shon (743zh2k@gmail.com). -The End-