Tag Archive: digital

Aug 23

Forensically, free online photo forensics tools – 29a.ch

Forensically is a set of free tools for digital image forensics. It includes clone detection, error level analysis, meta data extraction and more.

Source: Forensically, free online photo forensics tools – 29a.ch

Jun 29

MIG: Mozilla InvestiGator by mozilla

Mozilla’s platform for real-time digital forensics and incident response of modern infrastructures

MIG is a platform to perform investigative surgery on remote endpoints. It enables investigators to obtain information from large numbers of systems in parallel, thus accelerating investigation of incidents and day-to-day operations security. Watch on YouTube

MIG is composed of agents installed on all systems of an infrastructure that are be queried in real-time to investigate the file-systems, network state, memory or configuration of endpoints.

It’s an army of Sherlock Holmes, ready to interrogate your infrastructure within seconds.

Capability Linux MacOS Windows
file inspection check check check
network inspection check check (partial)
memory inspection check check check
vuln management check (planned) (planned)
system auditing (planned) (planned) (planned)

Imagine that it’s 7am on a saturday morning, and someone just released a critical vulnerability for your favorite PHP application. The vuln is already exploited and security groups are releasing indicators of compromise. Your weekend isn’t starting great, and the thought of manually inspecting thousands of systems isn’t making it any better.

MIG can help. The signature of the vulnerable PHP app (an md5 of a file, a regex on file, or just a filename) can be searches for across all your systems using the file module. Similarly, indicators of compromise such as specific log entries, backdoor files with {md5,sha{1,256,512,3-{256,512}}} hashes, IP addresses from botnets or signature in processes memories can be investigated using MIG. Suddenly, your weekend is looking a lot better. And with just a few command lines, thousands of systems will be remotely investigated to verify that you’re not at risk.

Source: MIG: Mozilla InvestiGator by mozilla

Apr 18

CALL FOR PAPERS | eDemocracy

CALL FOR PAPERS | eDemocracy.

 

e-Democracy 2015: Citizen rights in the world of the new computing paradigms 
6th International Conference on 
e-Democracy
CALL FOR PAPERS 
December 10-11, 2015, Athens, Greece
www.edemocracy2015.eu

Information and communication technologies move fast; faster than society, faster than governments, faster than the law. Connectivity is already impressive, but the near future brings about the interconnection of everything, via the Internet of Things. It also brings fundamental changes to our computing paradigm, with cloud computing gaining momentum and being expected to become the prevalent computing paradigm in the years to come. Increasingly more data are being collected, about almost everything one can imagine; and they remain there, in cyberspace, for ever, sometimes even resisting efforts to delete them. These data are so attractive that a new science, going by the name “big data” has already emerged. All these developments constitute in most cases an improvement in our everyday lives, but sometimes infringe our rights as citizens. The challenge, therefore, is to safeguard citizen rights in the face of a new era, landmarked by new computing paradigms.
This is the theme of the 6th occasion of the International Conference on e-Democracy that will be held in Athens, the cradle of democracy, on 10-11 December 2015. The conference is organized by the Scientific Council for the Information Society, in co-operation with the Hellenic Data Protection Authority and a substantial number of European and Greek universities and academia. It is intended, similarly to previous occasions, to provide a forum for presenting and debating the latest developments in the field, from a technical, political, and legal point of view.
The conference will include keynote addresses, tutorials, panels, Ph.D. colloquia and sessions, workshops, special, regular and poster sessions. All papers will be peer reviewed. Acceptance will be based on quality, relevance, and originality. Accepted papers will be published in the conference proceedings and selected papers will be invited to participate (after the necessary enhancements) to the evaluation process for inclusion in special issues of peer-reviewed journals.
The working language of the 6th International Conference on “e-Democracy ‘15: Challenges for Citizen Rights in the World of the New Computing Paradigms” is English. It is possible, however, that papers on Greek Law cases of e-Democracy issues be presented in Greek.
Topics of interest
The topics of interest include, but are not limited to, the following:

  • e-Democracy and e-Participation
      o e-Campaigning, e-Politics
      o e-Voting
      o Information and Consultation Platforms
      o Collaborative working environments for e-Democracy
      o Social computing and e-Democracy

• e-Government

    o Open and Big Data for e-Government
    o Cloud computing for e-Government
    o m-Government
    o e-Government services and administrative burdens
    o Business process modeling for e-Government systems
    o Tools and models for e-Government development
    o Case studies and European projects

• Security, Privacy and Trust

    o Security, Privacy and Trust in e-Business services
    o Security, Privacy and Trust in e-Government services
    o Security, Privacy and Trust in Online Social Network Services
    o Cloud Computing Security and Privacy
    o Identity Management, Identity Theft and Trust Management
    o Information Audit and Trust
    o Digital Rights Management
    o Trust and Reputation in Digital Environments
    o Cyber attacks and advances on network security
    o Cryptographic Technologies
    o Anonymisation Methodologies and Best Practices
    o Privacy by Design and Default Methodologies
    o Tracking Technologies and Do-Not-Track Systems
    o Privacy Impact Assessment Methodologies
    o Privacy Enhancing Location and Mobility Management
    o Security and Privacy Audit, Risk and Governance
    o Security and Data Protection Education
    o Tradeoffs between security and efficiency, usability, reliability and cost

• e-Crime, e-Fraud and Digital Forensics

    o Cyber Crime Detection and Prevention
    o Internet Fraud, Cyber War
    o Computer Forensics and Anti-forensics

• Social, legal and ethical issues

    o Digital Divide
    o Internet Addiction
    o Transparency and Accountability in Data Protection
    o Ethics in Digital Societies
    o Surveillance Technologies and Legal Implications
    o Freedom of Expression and Privacy
    o Freedom of Information and Privacy
    o Social factors of collaborative creativity

Important Dates
Full paper submission deadline: May 31, 2015
Notification of decision: July 15, 2015
Camera-ready deadline: July 30, 2015

Instructions for Authors
Submitted papers must not substantially overlap with papers that have been published or that have been simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymised (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 15 pages, including the bibliography and well-marked appendices, and should follow the LNCS style (http://www.springeronline.com/lncs). Submissions are to be made to the submission web site at https://easychair.org/conferences/?conf=edemocracy15. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of 31 May 2015 (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the conference. Efforts will be made to publish the conference proceedings by Springer in the Lecture Notes in Computer Science (LNCS) series.

The authors of selected accepted papers will be invited to extend their work for further publication in the Emerald journal Information and Computer Security (http://www.emeraldinsight.com/journal/ics# ).

Conference Steering Committee
Sokratis K. Katsikas, University of Piraeus, Greece (Chair)
Vassilis Zorkadis, Vice-President of SCIS, Greece (Vice-chair)
Philippos Mitletton, Secretary General of SCIS, Greece (Secretary)
Lazaros Iliadis, Democritus University of Thrace, Greece
Constantina Costopoulou, Agricultural University of Athens, Greece
Constantine Yialouris, Agricultural University of Athens, Greece
Elias Pimenidis, University of the West of England, UK
Spyros Voulgaris, Vrije Universiteit, The Netherlands
Irene Vassilaki, Board member of SCIS, Greece
Charalampos Patrikakis, Technological Educational Institute of Piraeus, Greece

Conference Honorary Chair
Alexander B. Sideridis, Agricultural University of Athens, Greece

Program Committee Chair
Sokratis K. Katsikas, University of Piraeus, Greece

Program Committee
Isaac Agudo, University of Malaga, Spain
Evgenia Alexandropoulou, University of Macedonia, Greece
Zacharoula Andreopoulou, Aristotle University of Thessaloniki, Greece
Maria Bottis, Ionian University, Greece
Christos Bouras, University of Patras, Greece
Athena Bourka, ENISA, Greece
David Chadwick, University of Kent, UK
Vassilios Chryssikopoulos, Ionian University, Greece
Nathan Clarke,University of Plymouth, UK
Tina Costopoulou, Agricultural University of Athens, Greece
Ernesto Damiani, University of Milan, Italy
Sabrina De Capitani Di Vimercati, University of Milan, Italy
Christos Douligeris, University of Piraeus, Greece
Carmen Fernández-Gago, University of Malaga, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti,University of Milan, Italy
Steven Furnell, University of Plymouth, UK
Jürgen Fuß,University of Applied Sciences Upper Austria,Austria
Dimitris Geneiatakis, EC Joint Research Center Ispra, Italy
Christos Georgiadis, University of Macedonia, Greece
Dimitris Gouscos, University of Athens, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Mp.Gupta,Indian Institute of Technology Delhi (IIT Delhi), India
Marit Hansen,Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein, Germany
Lazaros Iliadis, Democritus University of Thrace, Greece
Dimitra Kaklamani, National Technical University of Athens, Greece
Christos Kalloniatis, University of the Aegean, Greece
Ioanna Kantzavelou, Technological Educational Institute of Athens, Greece
Maria Karyda, University of the Aegean, Greece
Vasilis Katos, Bournemouth University, UK
Spyros Kokolakis, University of the Aegean, Greece
Nicholas Kolokotronis, University of Peloponnese, Greece
Panayiotis Kotzanikolaou, University of Piraeus, Greece
Costas Lambrinoudakis, University of Piraeus, Greece
Maria Lambrou, University of the Aegean, Greece
Konstantinos Limniotis, University of Athens, Greece
Antonio Lioy, Politecnico di Torino, Italy
Javier Lopez, University of Malaga, Spain
Nikos Lorentzos, Agricultural University of Athens, Greece
Euripidis Loukis, University of the Aegean, Greece
Emmanouil Magkos, Ionian University, Greece
Vicky Manthou, University of Macedonia, Greece
Nikolaos Marianos, University of the Aegean, Greece
Giannis Marias, Athens University of Economics and Business, Greece
Olivier Markowitch, Université Libre de Bruxelles (ULB), Belgium
Vashek Matyas, Masaryk University, Czech Republic
Vojtech Merunka, Czech Technical University in Prague, Czech Republic
Lilian Mitrou, University of the Aegean, Greece
Martin Molhanec, Czech Technical University in Prague, Czech Republic
Haris Mouratidis, University of Brighton, UK
Maria Ntaliani, Agricultural University of Athens, Greece
Christoforos Ntantogian, University of Piraeus, Greece
Martin Olivier, University of Pretoria, South Africa
Rolf Oppliger, eSECURITY Technologies, Switzerland
Andreas Pashalidis, K.U.Leuven, Belgium
Charalampos Patrikakis, National Technical University of Athens, Greece
Guenther Pernul, University of Regensburg,Germany
Elias Pimenidis, University of the West of England, UK
Nineta Polemi, University of Piraeus, Greece
Bart Preneel, K.U. Leuven, Belgium
Andreja Pucihar, University of Maribor, Slovenia
Gerald Quirchmayr, University of Vienna, Austria
Muttukrishnan Rajarajan, City University, UK
Kai Rannenberg, Goethe University Frankfurt, Germany
Panagiotis Rizomiliotis, University of the Aegean, Greece
Carsten Rudolph, Fraunhofer Institute for Secure Information Technology, Germany
Christoph Ruland, University of Siegen, Germany
Pierangela Samarati, University of Milan, Italy
Einar Snekkenes, Gjovik University College, Norway
Miguel Soriano,U niversitat Politècnica de Catalunya (UPC), Spain
Diomidis Spinellis, Athens University of Economics and Business, Greece
Paul Spirakis,University of Patras, Greece
Stephanie Teufel, University of Fribourg, iimt, Switzerland
Marianthi Theocharidou, Athens University of Economics & Business, Greece
Yannis Theocharis,University of Mannheim, Germany
Aggeliki Tsochou,Ionian University, Greece
Irene Vassilaki, SCIS, Greece
Maro Vlachopoulou, University of Macedonia, Greece
Vasileios Vlachos, Technological Educational Institute of Larissa, Greece
Spyros Voulgaris, VU University Amsterdam, The Netherlands
Edgar Weippl, Vienna University of Technology, Austria
Christos Xenakis, University of Piraeus, Greece
Constantine Yialouris, Agricultural University of Athens, Greece
Jianying Zhou, Institute for infocomm research, Singapore
Vassilis Zorkadis, Hellenic Data Protection Authority, Greece
Sotiris Karetsos, Agricultural University of Athens, Greece

Download CfP

Mar 25

Google Online Security Blog: Maintaining digital certificate security

Google Online Security Blog: Maintaining digital certificate security.

Jan 20

Secrypt 2015

CALL FOR PAPERS

International Conference on Security and Cryptography
SECRYPT website: http://www.secrypt.icete.org/

July 20 – 22, 2015
Colmar, Alsace, France

Sponsored by: INSTICC
INSTICC is Member of: WfMC, OMG and FIPA
Logistics Partner: SCITEVENTS

IMPORTANT DATES:
Regular Paper Submission: March 3, 2015
Authors Notification (regular papers): Mayl 18, 2015
Final Regular Paper Submission and Registration: May 26, 2015

You are cordially invited to submit a paper to the SECRYPT 2015 Conference, to be held in Colmar, Alsace, France. The deadline for paper submission is scheduled for March 3, 2015.

SECRYPT is an annual international conference covering research in information and communication security. The 12th International Conference on Security and Cryptography (SECRYPT 2015) will be held in Colmar, France on 20-22 July 2015.
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography.

Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged.

SECRYPT is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 139 submissions, 21% of which were orally presented and 22% presented as posters.

We would like to highlight the presence of the following keynote speakers:
– Anthony C. Boucouvalas, University of Peloponnese, Greece
– Eleni Karatza, Aristotle University of Thessaloniki, Greece
– Andrew Moore, University of Cambridge, United Kingdom

Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
It is planned to publish a short list of revised and extended versions of presented papers with Springer in a CCIS Series book (final approval pending).

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is a member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://www.secrypt.icete.org/BestPaperAward.aspx).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

SECRYPT is part of ICETE, the 12th International Joint Conference on e-Business and Telecommunications. Registration to SECRYPT allows free access to all other ICETE conferences.

ICETE 2015 will be held in conjunction with ICINCO 2015, ICSOFT 2015, SIMULTECH 2015 and DATA 2015. Registration to ICETE allows free access to the ICINCO, ICSOFT, SIMULTECH and DATA conferences as a non-speaker.

ICETE CONFERENCE CO-CHAIRS
Mohammad S. Obaidat, Monmouth University, United States
Pascal Lorenz, University of Haute Alsace, France

PROGRAM CHAIR:
Pierangela Samarati, Universita degli Studi di Milano, Italy

PROGRAM COMMITTEE:
Please check the program committee members at http://www.secrypt.icete.org/ProgramCommittee.aspx

CONFERENCE TOPICS:

– Access Control
– Applied Cryptography
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behavior Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Software Development Methodologies
– Security and Privacy for Big Data
– Security and privacy in Complex Systems
– Security and Privacy in Crowdsourcing
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Mobile Systems
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Smart Grids
– Security and Privacy in Social Networks
– Security and Privacy in the Cloud
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security in Distributed Systems
– Security Information Systems Architecture
– Security Management
– Security Metrics and Measurement
– Security Protocols
– Security requirements
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security

Jun 21

This Student Project Could Kill Digital Ad Targeting | Privacy and Regulation – Advertising Age

This Student Project Could Kill Digital Ad Targeting | Privacy and Regulation – Advertising Age.

May 22

Apple et les données biométriques, Acte 2 : après la voix, vos empreintes digitales ! : Reflets

Apple et les données biométriques, Acte 2 : après la voix, vos empreintes digitales ! : Reflets.

May 06

Who Has Your Back? 2013 | Electronic Frontier Foundation

When you use the Internet, you entrust your conversations, thoughts, experiences, locations, photos, and more to companies like Google, AT&T and Facebook. But what do these companies do when the government demands your private information? Do they stand with you? Do they let you know what’s going on?

In this annual report, the Electronic Frontier Foundation examined the policies of major Internet companies — including ISPs, email providers, cloud storage providers, location-based services, blogging platforms, and social networking sites — to assess whether they publicly commit to standing with users when the government seeks access to user data. The purpose of this report is to incentivize companies to be transparent about how data flows to the government and encourage them to take a stand for user privacy whenever it is possible to do so.

We compiled the information in this report by examining each company’s published terms of service, privacy policy, transparency report, and guidelines for law enforcement requests, if any. We also considered the company’s public record of fighting for user privacy in the courts and whether it is a member of the Digital Due Process coalition, which encourages Congress to improve outdated communications law. Finally, we contacted each company to explain our findings and gave them an opportunity to provide evidence of improved policies and practices. These categories are not the only ways that a company can stand up for users, of course, but they are important and publicly verifiable. In addition, not every company has faced a decision about whether to stand up for users in the courts, but we wanted to particularly commend those companies who have done so when given with the opportunity.

 

Who Has Your Back? 2013 | Electronic Frontier Foundation.

Feb 13

PROOFS: Security Proofs for Embedded Systems

Call for papers: PROOFS 2013
http://www.proofs-workshop.org/

PROOFS: Security Proofs for Embedded Systems
Santa Barbara, CA, USA — Saturday, August 24th, 2013

Goal of the Workshop

The goal of the PROOFS workshop is to promote methodologies that increase the confidence level in the security of embedded systems, especially those that contain cryptographic mechanisms.
Embedded system security currently consists mainly in security by obscurity solutions. This has obvious drawbacks:

* it requires costly black-box evaluation,
* there is no certainty about the correctness of the security, etc.

Formal methods allow to increase the trust level of digital systems. They are very appealing, for the following reasons:

* they are mature in theory, and there are tried and tested methods and tools,
* they have been applied on software for a long time, mainly for safety and conformance tests.

Some important security features (random number generation, physically unclonable functions, etc. ) rely on analog devices. Their correct functioning can be ascertained by techniques such as physical modeling and unitary experimental testing.
An important objective for the PROOFS workshop is to bridge the gap between both topics, and therefore to pave the way to « security by clarity » for embedded systems.

Venue

PROOFS will take place at Santa Barbara, CA, USA on Aug 24th, 2013.

Agenda

The workshop will feature two/three invited talks and contributed talks.

* Submission deadline : Sunday May 26th, 2013
* Authors notification : Sunday July 28th, 2013
* Final version due : Sunday August 11th, 2013
* PROOFS workshop venue : Saturday August 24th, 2013

Programme Committee

* Alessandro Barenghi, Politecnico di Milano, Italy.
* Loïc Correnson, CEA LIST, France.
* Emmanuelle Encrenaz, LIP6, France.
* Naofumi Homma, Tohoku U., Japan.
* Éliane Jaulmes, ANSSI, France.
* Gerwin Klein, NICTA, Australia.
* Debdeep Mukhopadhyay, IIT Kharagpur, India.
* Svetla Nikova, K.U.Leuven, Belgium.
* Bruno Robisson, ENSMSE, France.
* Graham Steel, LSV, France.
* Medhi Tibouchi, NTT, Japan.

Steering committee

* Sylvain Guilley, TELECOM-ParisTech, France.
* Çetin Kaya Koç, UCSB, USA.
* David Naccache, ENS, France.
* Akashi Satoh, AIST, Japan.
* Werner Schindler, BSI, Germany.

Local Committee

* Jean-Luc Danger, TELECOM-ParisTech, France.
* Çetin Kaya Koç, UCSB, USA.

Jan 31

The Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies

============== UBICOMM 2013 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

UBICOMM 2013, The Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies

September 29 – October 3, 2013 – Porto, Portugal

General page: http://www.iaria.org/conferences2013/UBICOMM13.html

Call for Papers: http://www.iaria.org/conferences2013/CfPUBICOMM13.html

– regular papers

– short papers (work in progress)

– posters

Submission page: http://www.iaria.org/conferences2013/SubmitUBICOMM13.html

Submission deadline: March 30, 2013

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Print proceedings will be available via Curran Associates, Inc.: http://www.proceedings.com/9769.html

Articles will be archived in the free access ThinkMind Digital Library: http://www.thinkmind.org

Please note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

UBICOMM 2013 Topics (topics and submission details: see CfP on the site)

Fundamentals

Semantics of ubiquity; Ubiquitous knowledge; Knowledge discovery mechanisms; Profiling ubiquitous environments; Ubiquitous technologies for education, learning, and training

Mobility

Ubiquitous computing; Wearable computing; Mobile computing; Nomadic computing; Mobile commerce; Mobile learning

Information Ubiquity

Ubiquitous information appliances; Information retrieval and filtering; Context awareness; Control of ubiquitous data; Data management and processing; Data replication, migration and dissemination; Ubiquitous computing and Internet of Things

Ubiquitous Multimedia Systems and Processing

Multimedia content recognition, indexing and search; Mobile graphics, games and entertainment; Ubiquitous multimedia applications and systems; Streaming mobile multimedia; Mobile media management; Multimedia ubiquitous platforms; Multimedia Indexing and Compression; Image and Signal Processing; Virtual reality in ubiquitous systems

Wireless Technologies

Bluetooth; 802.11.x; 802.15.x; ZigBee; WiMax

Web Services

Web 2.0; Semantic web; Web services; Ontology; Web Services evolution; Web Services applications

Ubiquitous networks

Ubiquitous networks; Network management; Network performance evaluation; Networks and technology convergence; Internet access in ubiquitous systems; Ubiquitous mesh, ad hoc and sensor networks; RFID; Reconfigurability and personalization of ubiquitous networks

Ubiquitous devices and operative systems

Design of devices for ubiquitous systems; Mobile devices; Wearable devices; Embedded systems; Operative systems for ubiquitous devices; Real-time operating systems and scheduling

Ubiquitous mobile services and protocols

Frameworks, architectures, and languages for ubiquitous services; Queries, transactions and workflows in mobile and ubiquitous Networks; Algorithms for ubiquitous systems; SLA/QoS in ubiquitous services; Ontology based services; Location-based services; Protocols and interaction mechanisms for ubiquitous services; Mobile services and service convergence; Service discovery mechanisms; Tracking in ubiquitous environments; Measurement, control, and management of ubiquitous services; Design and development of ubiquitous services; Wireless/mobile service delivery

Ubiquitous software and security

Ambient components; Agent technologies; Software for spontaneous interoperation; Dependability guarantees; Security; Key Management and Authentication; Trust; Privacy; Fault-tolerance; Multimedia Information Security

Collaborative ubiquitous systems

Cooperative networks for ubiquitous systems; Cooperative applications for ubiquitous networks; Handheld and wearable systems for interaction in collaborative groups and communities; Ad hoc collaboration in ubiquitous computing environments; Awareness of collaboration and of work environment; Inherently mobile collaborative work

Users, applications, and business models

Mobile user interfaces; Ubiquitous user-generated content (weblogs, wikis, etc.); Mobile and ubiquitous computing support for collaborative learning; User modeling and personalization; Context- and location-aware applications; Toolkits, testbeds, development environments; Tools and techniques for designing, implementing, & evaluating ubiquitous systems; Constructing, deploying and prototyping of ubiquitous applications; Evaluation of user models for ubiquitous environments; On-line analytical techniques; Human-computer interaction in ubiquitous computing environments; Ubiquitous e-Development (business, science, health, etc.); Case Studies; Emerging industrial/business/scientific ubiquitous scenarios; Ambient intelligence; Social issues and implications of ubiquitous system

Committee: http://www.iaria.org/conferences2013/ComUBICOMM13.html

Older posts «