Apologies if you receive multiple copies of this message)
--------------------------------------------------------------------------

Call for papers

Wiley’s Security and Communication Networks Special Issue on
Security of e-Systems


Aims & Goals

The dependence of people on electronic systems (e-systems) has increased 
tremendously in recent years. Examples of e-systems include stand-alone 
computers, wired and wireless networks, cellular telephony networks, 
corporate web sites, electronic service, e-commerce and e-payment 
systems, e-government systems, etc.

Many corporations and businesses rely heavily on the effective, proper 
and secure operation of e-systems. In most cases such systems are used 
for storing, transmitting and exchanging sensitive and confidential 
information on marketing, credit records, income tax, trade secrets, 
etc. The access of such data by unauthorized users may entail loss of 
money or releasing confidential information to competitors or enemies. 
Moreover, one would desire that security is provided in an e-system in a 
cost efficient manner.

Therefore, the need to efficiently secure e-systems is vital for the 
success of any enterprise. Desired services in a secure e-system include:

Authentication: This aims at assuring that a communication is authentic.
Confidentiality or secrecy: Information is only available to the right 
people.
Integrity: Information is not modified during the 
transmission/processing process.
Availability: Information can be accessed uninterruptedly.
Non-repudiation: The service should guarantee that neither the sender of 
the message/request can deny the transmission nor the receiver can deny 
the reception of the message/request.
Access control: This service grantees that access to information be 
controlled by (or on behalf) of the target system. Access control is the 
ability to limit and control access to host systems and applications via 
communication links.



Scope of Contributions

This special issue aims at providing a timely and concise research 
results in the field of security of e-systems. In this context, papers 
are solicited reporting on representative topics, which include but are 
not limited to, the following list:

Public key cryptosystems
Authentication and digital signatures
PKI systems
Biometric-based security systems
Trust management in communication networks
Electronic security applications including e-government, e-commerce and 
e-services security.
Security of web services
Intrusion detection systems
Virtual private networks (VPNs) security
Computer and network security risk management


Submission

Only original and unpublished research papers will be considered in this 
special issue. All submissions will be reviewed based on technical merit 
and relevance. Guidelines for prospective authors can be found on-line 
at http://www.interscience.wiley.com/journal/security). Prospective 
authors should submit their paper online at 
http://mc.manuscriptcentral.com/scn. When submitting the papers, the 
authors MUST make sure to select Manuscript type as "Special Issue", 
enter the "Running Head" and the "Special Issue title" as "SCN-SI-045" 
and "Sensor Security", respectively. Failure to do so may result in 
reject of your submission without review. Inquiries about the special 
issue can be sent to:[email protected] or [email protected].



Important dates

Submission due: July 31, 2012
Acceptance Notification: October 15, 2012
Final versions due: November 30, 2012
Tentative Publication date: March 2013



Guest Editors

Mohammad S. Obaidat

Department of Computer Science
Monmouth University
West Long Branch, NJ07764, USA
Email: [email protected]



Petros Nicopolitidis

Department of Informatics
Aristotle University of Thessaloniki
Box 888, 54124
Thessaloniki, Greece
Email: [email protected]



Weili Han

Software School
Fudan University
No. 825, Zhangheng Road,
Shanghai, China
Email: [email protected]



_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
[email protected]
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

Reply via email to