| |||||||||||||||
Security and Privacy in UC 2014 : Computer Communications Journal, Special Issue on: Security and Privacy in Unified Communications: Challenges and Solutions | |||||||||||||||
Link: http://www.journals.elsevier.com/computer‐communications/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Computer Communications Journal, Elsevier (Current Impact Factor: 1.352)
Special Issue on: Security and Privacy in Unified Communications: Challenges and Solutions Unified Communications (UC) merge different communication technologies, types of products, and services, from various manufacturers, operators, and countries, following diverse policies and standards. Specifically, in the context of UC, a range of communication tools are integrated in a way that both corporations and individuals are able to manage all their communications in one entity instead of doing it disjointly. It is therefore said that UC bridges the opening between the various computer related communication technologies and Voice over IP (VoIP). However, this high level of heterogeneity expands the risks related to security and privacy that stakeholders should deal with. To eliminate or even prevent the increasing threats to end-users and operators, it is important to explore this growing and timely research topic. This feature topic will benefit the research community towards identifying challenges and disseminating the latest methodologies and solutions to UC security and privacy issues. Its objective is to publish high-quality articles presenting open issues, algorithms, protocols, policies, frameworks, standards, and solutions for UC related to security and privacy. Only technical papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or a journal will be considered. Reviews and case studies which address state-of-art research and state-of-practice industry experiences are also welcomed. We solicit papers in a variety of topics related to unified communications security and privacy, including, but not limited to: - Authorization and access control for UC services - Denial of service prevention schemes for UC - Reliability and availability issues on UC - Penetration testing, intrusion detection and prevention - End-to-end security solutions - Cryptographic protocols for UC - Voice security - Signaling security and privacy - Multimedia application security and privacy analysis - Multimedia communication platforms vulnerabilities and attacks - Security and privacy in mobile communication services - Smartphone multimedia apps security and privacy - Social networking security and privacy - Testbed and case studies for secure and private UC services - Trust establishment in UC - IP Multimedia Subsystem (IMS) security - Privacy and identity management - Privacy enhancing technologies for UC - Privacy models for UC - Security and privacy assessment for UC - Security policies - Auditing, verification, and validation of UC services - Risk analysis and management - Cyber-security issues affecting UC - Protection of UC as a Critical Information Infrastructure - VoIP peering security issues All received submissions will be sent out for peer review by at least two experts in the field and evaluated with respect to relevance to the special issue, level of innovation, depth of contributions, and quality of presentation. Guest editors will make an initial determination of the suitability and scope of all submissions. Papers that either lack originality, clarity in presentation or fall outside the scope of the special issue will not be sent for review and the authors will be promptly informed in such cases. Submitted papers must not be under consideration by any other journal or publication. Schedule Manuscript submission deadline (EXTENDED): Nov. 21, 2014 Pre-notification (first round): January 30, 2015 Final-notification (second round): April 3, 2015 Publication of special issue: 2015 (Tentative) Submission Details Authors should follow the instructions available at http://ees.elsevier.com/comcom - kindly click the "Guide for Authors" link in the top box on the right side. When submitting the article, select "UC Security and Privacy" in the "Select an Article Type" box in the submission process. Guest Editors Georgios Karopoulos Joint Research Centre (JRC), Italy e-mail: georgios.karopoulos@jrc.ec.europa.eu Georgios Portokalidis Stevens Institute of Technology USA e-mail: gportoka@stevens.edu Josep Domingo-Ferrer Universitat Rovira i Virgili Catalonia e-mail: josep.domingo@urv.cat Ying-Dar Lin National Chiao Tung University (NCTU) Taiwan e-mail: ydlin@cs.nctu.edu.tw Dimitris Geneiatakis Joint Research Centre (JRC) Italy e-mail: dimitrios.geneiatakis@jrc.ec.europa.eu Georgios Kambourakis University of the Aegean Greece e-mail: gkamb@aegean.gr |
|