Last Call for Special Issue Papers: Trusted Computing and Communications

jueves, 28 de mayo de 2009

Last Call for Special Issue Papers: Trusted Computing and Communications
in the Wiley’s Security and Communication Networks (SCN) Journal
http://www3.interscience.wiley.com/cgi-bin/fulltext/121382872/HTMLSTART

With the rapid development and increasing complexity of computer and communications systems and networks, traditional security technologies may not be able to meet the demand for integrated and dynamic security solutions. As a challenging and fast-growing research area, trusted computing and communications work to make computer/communications systems and networks available, secure, reliable, and controllable. In general, trust works in three aspects: identity trust, function trust, and behavior trust. We can view traditional security as
the identity trust, whereas trusted computing and communications also include function trust and behavior trust of systems and networks. In fact, trusted computing and communications have gradually become an essential part of e-commence and e-government, including various distributed services, applications, and systems.This Special Issue (SI) is proposed in Wiley’s Security and Communication Networks (SCN) Journal (http://www.interscience.wiley.com/security) to provide a forum in the community to exchange the current research activities focusing on analysis, design, and applications of trusted computing and communications in various computer/communications systems and networks.


Topics of Interest

This SI on Trusted Computing and Communications in SCN includes (but not limited to)
the topics listed as follows:

Semantics, metrics and models of trust
Trust establishment, propagation, and management
Trusted computing platform
Trusted network computing
Trusted operating system
Trusted software
Trusted database
Trusted services and applications
Trust in e-commerce and e-government
Trust in mobile and wireless networks
Cryptography and security protocols
Reliable and fault-tolerant computer systems/networks
Survivable computer systems/networks
Authentication in computer systems/networks
Access control in computer systems/networks
Key management in computer systems/networks
Trust-related security and privacy
Trusted communications
Impact of distrust or mistrust systems
Architecture of secured and trusted systems
Security and privacy in trusted systems


Important Dates:

Papers submission deadline: May 30, 2009 (Firm Deadline)
Notification of decisions: August 30, 2009
Final Manuscript Due: November 30, 2009
Publication (tentatively): March/April 2010


Instructions for Authors and Review Process:

Papers must represent high-quality and previously unpublished works. Original research papers are
solicited in all areas of concern (as listed above). All submissions will be peer reviewed
by at least three experts working in the areas. The guidelines for prospective authors can be
found online at http://www.interscience.wiley.com/journal/security. Prospective authors should
submit their papers online at http://mc.manuscriptcentral.com/scn and no email submissions
will be accepted. When submitting the papers, the authors should make sure to choose the
Manuscript type as “Special Issue”, and enter “Running Head” and “Special Issue title”
as “SCN-SI-011” and “TrustedCom”, respectively, in the SCN Journal Manuscript Central website.


Guest Editors:
Prof. Guojun Wang, Central South University, China
Email: csgjwang@mail.csu.edu.cn

Prof. Laurence T. Yang, St. Francis Xavier University, Canada
Email: ltyang@stfx.ca

Prof. Kouichi Sakurai, Kyushu University, Japan
Email: sakurai@csce.kyushu-u.ac.jp

Publicado por unimauro en 16:12  
0 comentarios

Publicar un comentario