[Tccc] IJCSE Special Issue on Security Internet and Web App. - Call for Journal Papers

Sakib Pathan sakib.pathan
Tue Nov 1 02:49:28 EDT 2011


[**Apologies for cross-posting, multiple copies may be received**]*

International Journal of Computational Science and Engineering  (IJCSE)*

*Call For Papers*
Special Issue on: "*Future Trends in Security Issues in Internet and Web
Applications*"
*URL:* http://www.inderscience.com/browse/callpaper.php?callID=1729

*Guest Editors:*
Dr. Al-Sakib Khan Pathan, International Islamic University Malaysia
Dr. Muhammad Mostafa Monowar, University of Chittagong, Bangladesh

*Overview
*
Web applications have gone through a very rapid growth in the recent years
and their adoption is moving faster than that was anticipated few years
ago. Today, billions of transactions are done online with the aid of
different Web applications. Goods and products are advertised through the
Internet, prices go up and down based on online bidding, products are sold
and bought online, news and information sharing via Internet even
influences the political situation of a country. To formally define
Internet and Web, we may say that the Internet is a huge network of
networks, a complete networking infrastructure that connects millions of
computers together which could be located in different geographic
locations. The World Wide Web (WWW), or simply Web on the other hand, is a
way of accessing information over the medium of the Internet. So, Internet
is the implemented network infrastructure, Web is more like an information
sharing model.

Nowadays, almost everyone in touch with ?computer technology? is somehow
connected with Internet. Even though parts of the world are till today out
of proper Internet infrastructure, the existing number of users is huge who
use different types of Web applications for their intended tasks. To serve
this huge number of users, great volumes of data are stored in Web
application databases in different parts of the globe. From time to time,
the users need to interact with the backend databases via the user
interfaces for various tasks such as: updating data, making queries,
extracting data, and so forth. For all these operations, design interface
and structure play a crucial role, the quality of which has a great impact
on the security of the stored data in the database. The reality is that in
many cases many of these applications lack proper level of security or
sometimes the security is weak, which makes them vulnerable to get
compromised and allows illegitimate users to get access to the backend
databases.

A less secure Web application design may allow crafted injection and
malicious update on the backend database. This trend can cause lots of
damage and theft of trusted users? sensitive data by unauthorized users. In
the worst case, the attacker may gain full control over the Web application
and totally destroy or damage the system. Other than this particular
scenario, there are numerous forms of attacks which exploit other types of
vulnerabilities.

The objective of this special issue is to put together the achievements,
present research trends, and future potentials of dealing with various
security issues of the Internet and Web applications. We mainly welcome
technical papers; however comprehensive survey on specific topic may also
be considered (although not encouraged).

Any related topic will be considered; and indicative list includes:

    Security in Internet protocols: routing, naming, network management
    Security of Web-based applications
    Combating malware: detection, analysis, and prevention
    Security for future home networks, Internet of Things, body-area
networks
    Intrusion detection and prevention
    Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
    Privacy technologies
    Theory and practice of network security policies
    Intellectual property protection
    Watermarking and digital rights management
    Security for collaborative applications: teleconferencing and
video-conferencing
    Authentication and access control
    Cloud security
    SQL Injection
    Security in next generation and emerging Web applications

*Submission Guidelines
*
Submitted papers should not have been previously published nor be currently
under consideration for publication elsewhere. (N.B. Conference papers may
only be submitted if the paper was not originally copyrighted and if it has
been completely re-written).

All papers are refereed through a peer review process. A guide for authors,
sample copies and other relevant information for submitting papers are
available on the Author Guidelines (
http://www.inderscience.com/mapper.php?id=31) page

*Important Dates*

Manuscript due date: January 15, 2012
First round notification: March 15, 2012
Revised paper due: April 15, 2012
Notification of acceptance: May 01, 2012
Submission of final manuscript: May 20, 2012

All papers must be submitted online. To submit a paper, please go to Online
Submissions of Papers (http://www.inderscience.com/mapper.php?id=35&jid=125).
If you experience any problems submitting your paper online, please contact
submissions at inderscience.com, describing the exact problem you experience.
(Please include in your email the title of the Special Issue, the title of
the Journal and the names of the Guest Editors)

Please contact Dr. Al-Sakib Khan Pathan (sakib at iium.edu.my, spathan at ieee.org)
with any questions about the issue.

Regards,
Al-Sakib Khan Pathan
http://staff.iium.edu.my/sakib/



More information about the TCCC mailing list