[Tccc] CFP: Wiley’s Security and Communication Networks Journal, Special Issue on,Security of e-Systems

Petros Nicopolitidis petros
Fri Jan 13 05:10:04 EST 2012


Apologies if you receive multiple copies of this message)
--------------------------------------------------------------------------

Call for papers

Wiley?s Security and Communication Networks Special Issue on
Security of e-Systems


Aims & Goals

The dependence of people on electronic systems (e-systems) has increased 
tremendously in recent years. Examples of e-systems include stand-alone 
computers, wired and wireless networks, cellular telephony networks, 
corporate web sites, electronic service, e-commerce and e-payment 
systems, e-government systems, etc.

Many corporations and businesses rely heavily on the effective, proper 
and secure operation of e-systems. In most cases such systems are used 
for storing, transmitting and exchanging sensitive and confidential 
information on marketing, credit records, income tax, trade secrets, 
etc. The access of such data by unauthorized users may entail loss of 
money or releasing confidential information to competitors or enemies. 
Moreover, one would desire that security is provided in an e-system in a 
cost efficient manner.

Therefore, the need to efficiently secure e-systems is vital for the 
success of any enterprise. Desired services in a secure e-system include:

Authentication: This aims at assuring that a communication is authentic.
Confidentiality or secrecy: Information is only available to the right 
people.
Integrity: Information is not modified during the 
transmission/processing process.
Availability: Information can be accessed uninterruptedly.
Non-repudiation: The service should guarantee that neither the sender of 
the message/request can deny the transmission nor the receiver can deny 
the reception of the message/request.
Access control: This service grantees that access to information be 
controlled by (or on behalf) of the target system. Access control is the 
ability to limit and control access to host systems and applications via 
communication links.



Scope of Contributions

This special issue aims at providing a timely and concise research 
results in the field of security of e-systems. In this context, papers 
are solicited reporting on representative topics, which include but are 
not limited to, the following list:

Public key cryptosystems
Authentication and digital signatures
PKI systems
Biometric-based security systems
Trust management in communication networks
Electronic security applications including e-government, e-commerce and 
e-services security.
Security of web services
Intrusion detection systems
Virtual private networks (VPNs) security
Computer and network security risk management


Submission

Only original and unpublished research papers will be considered in this 
special issue. All submissions will be reviewed based on technical merit 
and relevance. Guidelines for prospective authors can be found on-line 
at http://www.interscience.wiley.com/journal/security). Prospective 
authors should submit their paper online at 
http://mc.manuscriptcentral.com/scn. When submitting the papers, the 
authors MUST make sure to select Manuscript type as "Special Issue", 
enter the "Running Head" and the "Special Issue title" as "SCN-SI-045" 
and "Sensor Security", respectively. Failure to do so may result in 
reject of your submission without review. Inquiries about the special 
issue can be sent to:petros at csd.auth.gr or wlhan at fudan.edu.cn.



Important dates

Submission due: July 31, 2012
Acceptance Notification: October 15, 2012
Final versions due: November 30, 2012
Tentative Publication date: March 2013



Guest Editors

Mohammad S. Obaidat

Department of Computer Science
Monmouth University
West Long Branch, NJ07764, USA
Email: obaidat at monmouth.edu



Petros Nicopolitidis

Department of Informatics
Aristotle University of Thessaloniki
Box 888, 54124
Thessaloniki, Greece
Email: petros at csd.auth.gr



Weili Han

Software School
Fudan University
No. 825, Zhangheng Road,
Shanghai, China
Email: wlhan at fudan.edu.cn






More information about the TCCC mailing list