[Tccc] Deadline extended: Wiley’s Security and Communication Networks Journal, Special Issue on,Security of e-Systems

Petros Nicopolitidis petros
Tue Jul 31 09:03:07 EDT 2012


Apologies if you receive multiple copies of this message)
--------------------------------------------------------------------------


*Submission deadline extended to September 30, 2012*

Call for papers

Wiley?s Security and Communication Networks Special Issue on
Security of e-Systems



Aims & Goals

The dependence of people on electronic systems (e-systems) has increased
tremendously in recent years. Examples of e-systems include stand-alone
computers, wired and wireless networks, cellular telephony networks,
corporate web sites, electronic service, e-commerce and e-payment
systems, e-government systems, etc.

Many corporations and businesses rely heavily on the effective, proper
and secure operation of e-systems. In most cases such systems are used
for storing, transmitting and exchanging sensitive and confidential
information on marketing, credit records, income tax, trade secrets,
etc. The access of such data by unauthorized users may entail loss of
money or releasing confidential information to competitors or enemies.
Moreover, one would desire that security is provided in an e-system in a
cost efficient manner.

Therefore, the need to efficiently secure e-systems is vital for the
success of any enterprise. Desired services in a secure e-system include:

Authentication: This aims at assuring that a communication is authentic.
Confidentiality or secrecy: Information is only available to the right
people.
Integrity: Information is not modified during the
transmission/processing process.
Availability: Information can be accessed uninterruptedly.
Non-repudiation: The service should guarantee that neither the sender of
the message/request can deny the transmission nor the receiver can deny
the reception of the message/request.
Access control: This service grantees that access to information be
controlled by (or on behalf) of the target system. Access control is the
ability to limit and control access to host systems and applications via
communication links.



Scope of Contributions

This special issue aims at providing a timely and concise research
results in the field of security of e-systems. In this context, papers
are solicited reporting on representative topics, which include but are
not limited to, the following list:

Public key cryptosystems
Authentication and digital signatures
PKI systems
Biometric-based security systems
Trust management in communication networks
Electronic security applications including e-government, e-commerce and
e-services security.
Security of web services
Intrusion detection systems
Virtual private networks (VPNs) security
Computer and network security risk management


Submission

Only original and unpublished research papers will be considered in this
special issue. All submissions will be reviewed based on technical merit
and relevance. Guidelines for prospective authors can be found on-line
athttp://www.interscience.wiley.com/journal/security). Prospective
authors should submit their paper online at
http://mc.manuscriptcentral.com/scn. When submitting the papers, the
authors MUST make sure to select Manuscript type as "Special Issue",
enter the "Running Head" and the "Special Issue title" as "SCN-SI-045"
and "Sensor Security", respectively. Failure to do so may result in
reject of your submission without review. Inquiries about the special
issue can be sentto:petros at csd.auth.gr  orwlhan at fudan.edu.cn.



Important dates

Submission due: September 30, 2012
Acceptance Notification: December 15, 2012
Final versions due: January 31, 2013
Tentative Publication date: May 2013



Guest Editors

Mohammad S. Obaidat

Department of Computer Science
Monmouth University
West Long Branch, NJ07764, USA
Email:obaidat at monmouth.edu



Petros Nicopolitidis

Department of Informatics
Aristotle University of Thessaloniki
Box 888, 54124
Thessaloniki, Greece
Email:petros at csd.auth.gr



Weili Han

Software School
Fudan University
No. 825, Zhangheng Road,
Shanghai, China
Email:wlhan at fudan.edu.cn










More information about the TCCC mailing list