|
The 2nd International Conference on e-Business and Information System Security (EBISS'2010)
第二届IEEE电子商务和信息系统安全国际会议- EBISS2010(EBISS2009已全部EI Compendex\ISTP检索)
5月22-23,2010,武汉,中国
http://www.icebiss.org/ebiss2010/
http://www.ieee-ecommerce.org.cn/ebiss2010/
论文提交日期: 2010年1月15日
论文录用通知日期: 2010年1月 22 日
论文修订版本提交日期: 2010年1月25日
论文注册日期: 2010年1月28日
论文提交系统: http://www.icebiss.org/ebiss2010/openconf/openconf.php (需要提交全文)
会议论文模版: http://www.ieee-ecommerce.org.cn/ebiss2010/instruct8.5x11.doc (只接受英文稿件)
IEEE会议论文版权表:http://www.ieee-ecommerce.org.cn/ebiss2010/IEEECopyrightForm.doc (注册后提交)
2010 第二届电子商务和信息系统安全国际会议(EBISS2010)是一个国际性的论坛,为工程师、教师和科学研究者提供一个讨论电子商务最新的一些科学研究成果。电子商务是现今科学研究中的一个重要领域,我们接受电子商务相关领域高质量的论文,研究领域包括:“通信和网络安全”,“移动商务和服务”和“商务和社会应用”。EBISS2010会议由华中科技大学,华中师范大学和武汉大学联合举办。EBISS2010会议论文集将由IEEE出版社出版,论文集中收录论文将进入IEEE Xplore数据库,并将全部被EI Compendex和ISTP检索。论文集中优秀的论文将被推荐到SCI或EI收录的国际期刊推荐发表。
欢迎研究员、工程师、教师和学生踊跃投稿,会议论文主题由以下三大领域构成,但并不局限于:
Area 1 : Web and Mobile Business Systems and Services/基于web和moblie的商业系统和服务
Portals
Web Services
Mobile Services and Architectures
Mobile Business and Ubiquitous Services
Systems Development and Evaluation
Quality of Service and Metrics
E-Business Systems for Multiple Platforms
E-Negotiation and Auction Mechanisms
Metering, Accounting, Charging, Billing Systems
Web Personalization and Decision Making
Web Data Visualization
User Interfaces and Usability
GPS Applications and Location-based Services
Mobility Management in Next Generation Networks
Grid Computing for e-Business
Open Source Technologies in e-Business
Area 2 : Business and Social Applications/商业和应用
E-Service
E -Learning
E-Entertainment
E-Banking
E-commerce
E -Government
E-Society
Architectures and applications of B2B, B2C and C2C
Business processes re-engineering
Healthcare and Medical Applications
Virtual Organizations
Collaborative Business Systems
Supply-chain Management
CRM and Business Solutions
Workflow Management Systems
E-Marketing and Consumer Behavior
Intellectual Rights
Trust and Privacy Issues in Social Networks
Semantic Web Applications and Ontology Sharing
Adoption of Standards and Protocols for e-Business Applications
Business Intelligence
Information Infrastructures of Businesses
Area 3: Communication and Network Security/通信与网络安全
Information security
Authentication protocols and message authentication
Biometric security
Computer and network forensics
Applied Cryptography
DDOS attacks, DNS spoofing, and countermeasures
Formal trust models
Information hiding and watermarking
Intrusion detection, localization, and countermeasures
Mobile and Wireless network security
Network security metrics and performance
Network traffic analysis techniques
Operating systems security and log analysis tools
Optical network security
Privacy and privacy enhancing technologies
Security modeling and protocol design
VPN Technology and Services
Data Warehouses and Data Mining
VoIP Security
Peer-to-Peer Security
Vulnerability, exploitation tools and virus analysis
======================================
The Secretary of EBISS2010
Email: ebiss2010@vip.sina.com,info@icebiss.org
Phone: +86-15071210956
====================================== |
|