ijsi
Special Issue On Information and System Security
@ International Journal of Software and Informatics (IJSI)
(http://www.ijsi.org/ch/index.aspx)

Theme

Attacks involving unauthorized access and modification of systems resources pose serious threats in modern computing environments. It is essential to develop novel and practical techniques to counter such threats. This special issue seeks original papers focusing on various aspects of security issues. You are cordially invited to submit your research paper to this special issue to be published in International Journal of Software and Informatics (IJSI) (URL:http://www.ijsi.org). IJSI is a peer-reviewed international journal with focuses on theoretical foundation and practical research of software techniques, which has an editorial board consisting of internationally well-known experts.

Topics

Topics include but are not limited to

  • Software security
  • Network security
  • Access control
  • Cloud computing security
  • Virtualization security
  • Hardware-based security
  • Database security
  • Formal methods for security
  • Accounting and audit
  • Anonymity
  • Intrusion detection
  • Applied cryptography
  • Authentication
  • Digital forensics
  • Embedded systems security
  • Key management
  • Malware analysis
  • Operating system security
  • Web security
  • Email security
  • Privacy-enhancing technology
  • Security architectures
  • Security metrics
  • Trusted computing
  • Usable security and privacy
  • Important Dates

    Manuscript Due: June 10 2014
    Review feedback: July 25 2014
    Revised version submission: August 25 2014
    Acceptance notification: September 10 2014
    Final paper submission: September 25 2014

    Paper Submissions

    All submissions must meet the following requirements:

    All submissions must be uploaded to the EasyChair Submission System

    Paper Review

    All submissions will go through an anonymous peer review process. The review process and quality criteria will follow the journal's review process protocol and standard. The decisions on acceptance of each paper will be based on the reviewers' reports on the quality of the submission.

    Guest Editors

    Dr. Ping Yang
    State University of New York at Binghamton, USA
    Email: pyang@binghamton.edu

    Dr. Xiaolong Jin
    Institute of Computing Technology, Chinese Academy of Sciences, China
    Email: jinxiaolong@ict.ac.cn