posted by user: aircc_cfp || 3020 views || tracked by 2 users: [display]

IJSPTM 2024 : International Journal of Security, Privacy and Trust Management

FacebookTwitterLinkedInGoogle

Link: https://airccse.org/journal/ijsptm/index.html
 
When N/A
Where N/A
Submission Deadline Nov 23, 2024
Notification Due Dec 10, 2024
Final Version Due Dec 17, 2024
Categories    security   privacy   internet of things   trust
 

Call For Papers

International Journal of Security, Privacy and Trust Management ( IJSPTM )

Scope and Topics

With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks–both wired and wireless–centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.

Topics of interest include but are not limited to, the following

  • Trust, Security, Privacy, Policy management
  • Agent Based Trust Management
  • Authorization, Authentication and Identity Management
  • Pervasive Computation Trust
  • Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust
  • Decentralized Trust Management
  • Trust in Service-Oriented Architecture- Open Architecture and Services
  • Social Networks & Web 2.0 Trust Management
  • Trust Management system for Wireless, mobile and sensor networks
  • Policy of Trust in E-leaning systems
  • Trust/risk based security frameworks
  • Trust Management for virtual organizations
  • Trust and Reputation Management
  • Multimedia Content Management

Paper Submission

Authors are invited to Submit papers for this journal through Email: ijsptm@aircconline.com or through Submission system Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

Submission Deadline:November 23, 2024
Authors Notification: December 10, 2024
Final Manuscript Due: December 17, 2024
Publication Date:Determined by the Editor-in-Chief

Related Journal

Current Issue

August 2024, Volume 13, Number 3

Optimizing Identity Management: Key Strategies for Effective Governance and Administration Full Text
Nikhil Ghadge, Okta.Inc, USA

Guardians of the Digital Realm: Mapping Key Stakeholders in Data Privacy and Digital Credit Universe Full Text
Oluwabunmi A. Falebita1 and Oluwafemi P. Famakinde2, 1Innovation and Technology Policy Department, Nigeria 2Nigeria Institute of Social and Economic Research (NISER), Nigeria


May 2024, Volume 13, Number 1/2

Analysis of Media Discourse on Intellectual Property Rights Related to Metaverse in Korea Full Text
Ye-Sol Seo1, Hyo-Min Kim1, Austin Kang2, 1Hankuk University of Foreign Studies, Republic of Korea, 2Seoul National University, Republic of Korea

November 2023, Volume 12, Number 3/4

Deep Learning Meets Blockchain for Automated and Secure Access Control Full Text
Asma Jodeiri Akbarfam1, Sina Barazandeh2, Deepti Gupta3, and Hoda Maleki1, 1Augusta University, Augusta, USA,
2Bilkent University, Turkey, 3Texas A&M University Central Texas, USA

Object Capability Model for Tee: A Cheri Based Compartmentalization Approach Full Text
Bala Subramanyan, Verifoxx Ltd, UK

May 2023, Volume 12, Number 2

The Performance Comparison of a Brute-Force Password Cracking Algorithm using Regular Functions and Generator Functions in Python Full Text
Berker Tasoluk1, Zuhal Tanrikulu2,1Istanbul University, Turkey, 2Bogazici University, Turkey

February 2023, Volume 12, Number 1

How Reversibility Differentiates Cyber from Kinetic Warfare: A Case Study in the Energy Sector Full Text
Tom Johansmeyer, University of Kent, UK

A Trust Management Framework for Vehicular Ad Hoc Networks Full Text
Rezvi Shahariar and Chris Phillips, University of London, UK

August 2022, Volume 11, Number 3

Technical Analysis on the Cyber Organizational Criminology of Dictatorial Military Conducts -- Experience from Human Trafficking and Coercions by Military Cyber Aggressions
Yang Pachankis, Universal Life Church, USA

May 2022, Volume 11, Number 1/2

Enhanced Fuzzing System for Proactive Security Gap Exposure
Linlin Zhang and Ning Luo, Visual Computing Group, Intel Asia-Pacific Research & Development Ltd, China

May 2021, Volume 10, Number 2

GasMASk Annotation-based Code Generator as an Embedded Domain-Specific Language in Collaborative Multi-Agent Systems
Orcun Oruc and Uwe Aßmann, TU Dresden, Germany

February 2021, Volume 10, Number 1

Security and Privacy Perceptions among Female Online Social Media Users: A Case Study of Bangladesh
Farida Chowdhury, Sadia Sultana and Mahruba Sharmin Chowdhury, Shahjalal University of Science and Technology, Bangladesh


Editor in Chief

Editorial Board Members

... More

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICISPP 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
NMCO 2025   11th International Conference on Networks, Mobile Communication
BIOSIG 2025   International Conference of the Biometrics Special Interest Group
FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
BIOSIG 2025   International Conference of the Biometrics Special Interest Group