posted by user: aircc_cfp || 22438 views || tracked by 7 users: [display]

IJSPTM 2024 : International Journal of Security, Privacy and Trust Management

FacebookTwitterLinkedInGoogle

Link: https://airccse.org/journal/ijsptm/index.html
 
When N/A
Where N/A
Submission Deadline Nov 2, 2024
Notification Due Nov 22, 2024
Final Version Due Nov 29, 2024
Categories    grid computing   information security   software architecture   software engineering
 

Call For Papers

International Journal of Security, Privacy and Trust Management ( IJSPTM )

Scope and Topics

With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks–both wired and wireless–centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.

Topics of interest include but are not limited to, the following

  • Trust, Security, Privacy, Policy management
  • Agent Based Trust Management
  • Authorization, Authentication and Identity Management
  • Pervasive Computation Trust
  • Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust
  • Decentralized Trust Management
  • Trust in Service-Oriented Architecture- Open Architecture and Services
  • Social Networks & Web 2.0 Trust Management
  • Trust Management system for Wireless, mobile and sensor networks
  • Policy of Trust in E-leaning systems
  • Trust/risk based security frameworks
  • Trust Management for virtual organizations
  • Trust and Reputation Management
  • Multimedia Content Management

Paper Submission

Authors are invited to Submit papers for this journal through Email: ijsptm@aircconline.com or through Submission system Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

Submission Deadline:November 02, 2024
Authors Notification: November 22, 2024
Final Manuscript Due: November 29, 2024
Publication Date:Determined by the Editor-in-Chief

Related Journal

Current Issue

August 2024, Volume 13, Number 3

Optimizing Identity Management: Key Strategies for Effective Governance and Administration Full Text
Nikhil Ghadge, Okta.Inc, USA

Guardians of the Digital Realm: Mapping Key Stakeholders in Data Privacy and Digital Credit Universe Full Text
Oluwabunmi A. Falebita1 and Oluwafemi P. Famakinde2, 1Innovation and Technology Policy Department, Nigeria 2Nigeria Institute of Social and Economic Research (NISER), Nigeria


May 2024, Volume 13, Number 1/2

Analysis of Media Discourse on Intellectual Property Rights Related to Metaverse in Korea Full Text
Ye-Sol Seo1, Hyo-Min Kim1, Austin Kang2, 1Hankuk University of Foreign Studies, Republic of Korea, 2Seoul National University, Republic of Korea

November 2023, Volume 12, Number 3/4

Deep Learning Meets Blockchain for Automated and Secure Access Control Full Text
Asma Jodeiri Akbarfam1, Sina Barazandeh2, Deepti Gupta3, and Hoda Maleki1, 1Augusta University, Augusta, USA,
2Bilkent University, Turkey, 3Texas A&M University Central Texas, USA

Object Capability Model for Tee: A Cheri Based Compartmentalization Approach Full Text
Bala Subramanyan, Verifoxx Ltd, UK

May 2023, Volume 12, Number 2

The Performance Comparison of a Brute-Force Password Cracking Algorithm using Regular Functions and Generator Functions in Python Full Text
Berker Tasoluk1, Zuhal Tanrikulu2,1Istanbul University, Turkey, 2Bogazici University, Turkey

February 2023, Volume 12, Number 1

How Reversibility Differentiates Cyber from Kinetic Warfare: A Case Study in the Energy Sector Full Text
Tom Johansmeyer, University of Kent, UK

A Trust Management Framework for Vehicular Ad Hoc Networks Full Text
Rezvi Shahariar and Chris Phillips, University of London, UK

August 2022, Volume 11, Number 3

Technical Analysis on the Cyber Organizational Criminology of Dictatorial Military Conducts -- Experience from Human Trafficking and Coercions by Military Cyber Aggressions
Yang Pachankis, Universal Life Church, USA

May 2022, Volume 11, Number 1/2

Enhanced Fuzzing System for Proactive Security Gap Exposure
Linlin Zhang and Ning Luo, Visual Computing Group, Intel Asia-Pacific Research & Development Ltd, China

May 2021, Volume 10, Number 2

GasMASk Annotation-based Code Generator as an Embedded Domain-Specific Language in Collaborative Multi-Agent Systems
Orcun Oruc and Uwe Aßmann, TU Dresden, Germany

February 2021, Volume 10, Number 1

Security and Privacy Perceptions among Female Online Social Media Users: A Case Study of Bangladesh
Farida Chowdhury, Sadia Sultana and Mahruba Sharmin Chowdhury, Shahjalal University of Science and Technology, Bangladesh


Editor in Chief

Editorial Board Members

... More

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
IJSPTM 2024   International Journal of Security, Privacy and Trust Management
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ICISPP 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
SOFE 2025   11th International Conference on Software Engineering
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)