Smart Mobility – Building Trusted Mobile Applications
Mobile/wireless communications, services and appliances play an ever-growing role in all aspects of citizens and consumers existence, for improving their personal and professional quality of life. To ensure durable growth of such consumer and citizen digital offers, it is urgent to address thoroughly the trust and security challenge of Mobility.
The Smart Mobility conference focuses on trusted mobile applications and usages covering all transactions completed in a mobile and convenient ecosystem and securely managed. Smart Mobility platform intends to reflect Market and Industry trends at the cutting edge of this new application domain, from mobile applications development over the viewpoint of mobile ecosystems to secure transactions and device management.
The Smart Mobility Program Committee is expecting proposals from world-class trustworthy mobility and e-mobility applications R&D, business & marketing experts from the mobile telecommunication, finance, banking, entertainment, and health and transport industry leaders. Are also expected presentations from research laboratories and universities, industry associations, international standardization organizations and governmental bodies, institutions, consultants, analysts and lawyers.
Trust, Security & Privacy Protection in Mobile Operating Systems and Application Delivery Process
► Requirements Specification & Case Studies
► Mobile Security Software Implementation
► Devices and network Protection against Major Security Threats And Detection
► Threat analyses for Mobile Systems
► Mobile platforms building and testing
► Cross-platforms issues, parametric development
Servers & Middleware Security Issues in Mobile Systems
► Safe and secure Content Downloading, Software Upgrading, and Devices re-Configurability
► Mobile SOA & Web Services Oriented Architecture Platforms Issues
► Cloud Computing
► Mobile Web Services
► Service Level Agreements, QoS, Reliability Issues
Management, Deployment, Adoption & Diffusion of Mobile Applications & Services
► Impact of Fixed, Mobile and Multimedia Convergence
► Economics of Security and Privacy of Mobile Ecosystem
► Cooperation between MNO/Service Providers/Banks
► Trusted Service Management
► Emerging Theories, Models, Challenges
Trusted Mobile Applications and Services
► Mobile Payment & Financial Transactions Management
► NFC, Contactless and other Wireless protocols based applications
► Context & Location Sensitive Applications, LBS, RTLS, etc.
► RFID & Sensors Applications Management
► Transport transactions, Intelligent Transportation Systems, etc.
► Mobile Collaboration Services Management
► Trusted Mobile Internet
► Other Innovative Mobile Applications:
► messaging services and e-mail, m-Health services, mobile e-Learning Applications, Peer-to-Peer applications, etc.
► Multimedia Content Protection, Conditional Access: Mobile TV/Video/Music issues; Entertainment, games, adult, sports, gambling services; Unified Digital Right Management, on-line IPR licensing
Web x.0 and ontology of mobile ecosystems
Machine to Machine and Machine Learning
Mobile Identity: Identity management and authentication
Trust, Security & Privacy Protection in pervasive environments
HOW TO SUBMIT?
Prospective authors must submit a short abstract using the attached template (zipped Word document).
1. Short, explicit and appealing title.
2. Name, function, address, phone, e-mail, and affiliation of all the author(s) of the presentation together with a short description of the author(s)’ expertise.
3. The name of the actual speaker (only 1 person is allowed to present).
4. 3 to 4 bullet points (1 line max. each).
5. Length of the abstract: between 300-500 words (one A4 page).
6. Specify the conference they address to: e-Smart, Smart Mobility, World e-ID.
Submissions not conforming to these formatting instructions risk rejection regardless of their technical merit.
All submissions must be original ones, not previously published elsewhere, publicly presented or submitted in parallel to any other event. They should be informative and impartial. The Program Committees will review all submissions and will reject any commercially-oriented ones.
Authors are invited to submit their proposals electronically to email@example.com
If authors do not receive acknowledgment within 72 hours, they are kindly invited to contact directly Lenick Perron – Strategies Telecoms & Multimedia – Phone + 33 1 48 59 99 32
Deadline for abstract submission is March 15th, 2010
Decisions and Presentation
Notification of acceptance or rejection will be sent to authors on April 30th, 2010.
Authors of accepted papers commit themselves to present their paper at the conference. In case of personal impediment, the speaking person shall arrange a substitute speaker.
The speaker’s registration rate is €455 (60% discount on the regular rate). The speaker has access to any conference during the entire Smart Event 2010.
Co-authors also benefit from preferential attendance rates. Speakers’ travel and accommodation expenses are not covered by the organizers.
Proceedings of each conference will be available at the opening of the event. Clear instructions about the proceedings will be sent to the authors of accepted papers.
The organizers commit themselves not to disseminate the presentations before the conferences.
Other important dates
► Official Program Appearance: May 31st, 2010
► Complete presentation for the proceedings: August 28th, 2010
Papers submitted to The Computer Journal
The Computer Journal, one of the longest-established journals serving all branches of the academic computer science community, will publish the best academic papers presented at Smart Event 2010. In the CFP form, you will be asked whether you are interested to submit the paper associated to your presentation, if any.
The Computer Journal is published by the Oxford University Press on behalf of the British Computer Society. More at http://comjnl.oxfordjournals.org/