posted by user: Busra || 22134 views || tracked by 6 users: [display]

IJSPTM 2026 : International Journal of Security, Privacy and Trust Management

FacebookTwitterLinkedInGoogle

Link: https://airccse.org/journal/ijsptm/index.html
 
When N/A
Where N/A
Submission Deadline Jan 9, 2026
Notification Due Jan 31, 2026
Final Version Due Feb 7, 2026
Categories    security   networks   privacy   grid computing
 

Call For Papers

International Journal of Security, Privacy and Trust Management ( IJSPTM )

Scope and Topics


With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks–both wired and wireless–centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.

Topics of interest include but are not limited to, the following

  • Trust, Security, Privacy, Policy management
  • Agent Based Trust Management
  • Authorization, Authentication and Identity Management
  • Pervasive Computation Trust
  • Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust
  • Decentralized Trust Management
  • Trust in Service-Oriented Architecture- Open Architecture and Services
  • Social Networks & Web 2.0 Trust Management
  • Trust Management system for Wireless, mobile and sensor networks
  • Policy of Trust in E-leaning systems
  • Trust/risk based security frameworks
  • Trust Management for virtual organizations
  • Trust and Reputation Management
  • Multimedia Content Management

Paper Submission


Authors are invited to Submit papers for this journal through Email: ijsptm@aircconline.com or through Submission system Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

Submission Deadline:January 09, 2026
Authors Notification: January 31, 2026
Final Manuscript Due: February 07, 2026
Publication Date:Determined by the Editor-in-Chief

Related Journal

Current Issue

May 2025, Volume 14, Number 1/2

Data Privacy and Digital Rights: Protecting Privacy through Law Surveillance and Consent Full Text
Sijuola Atanda Lawal, Institute of Advanced Legal Studies, United Kingdom

November 2024, Volume 13, Number 4

Generative AI Ethics: a Comprehensive Safety and Regulation Framework Full Text
Arun kumar Thirunagalingam, Data & Technical Operations, USA

August 2024, Volume 13, Number 3

Optimizing Identity Management: Key Strategies for Effective Governance and Administration Full Text
Nikhil Ghadge, Okta.Inc, USA

Guardians of the Digital Realm: Mapping Key Stakeholders in Data Privacy and Digital Credit Universe Full Text
Oluwabunmi A. Falebita1 and Oluwafemi P. Famakinde2, 1Innovation and Technology Policy Department, Nigeria 2Nigeria Institute of Social and Economic Research (NISER), Nigeria

May 2024, Volume 13, Number 1/2

Analysis of Media Discourse on Intellectual Property Rights Related to Metaverse in Korea Full Text
Ye-Sol Seo1, Hyo-Min Kim1, Austin Kang2, 1Hankuk University of Foreign Studies, Republic of Korea, 2Seoul National University, Republic of Korea

November 2023, Volume 12, Number 3/4

Deep Learning Meets Blockchain for Automated and Secure Access Control Full Text
Asma Jodeiri Akbarfam1, Sina Barazandeh2, Deepti Gupta3, and Hoda Maleki1, 1Augusta University, Augusta, USA,
2Bilkent University, Turkey, 3Texas A&M University Central Texas, USA

Object Capability Model for Tee: A Cheri Based Compartmentalization Approach Full Text
Bala Subramanyan, Verifoxx Ltd, UK

May 2023, Volume 12, Number 2

The Performance Comparison of a Brute-Force Password Cracking Algorithm using Regular Functions and Generator Functions in Python Full Text
Berker Tasoluk1, Zuhal Tanrikulu2,1Istanbul University, Turkey, 2Bogazici University, Turkey

February 2023, Volume 12, Number 1

How Reversibility Differentiates Cyber from Kinetic Warfare: A Case Study in the Energy Sector Full Text
Tom Johansmeyer, University of Kent, UK

A Trust Management Framework for Vehicular Ad Hoc Networks Full Text
Rezvi Shahariar and Chris Phillips, University of London, UK

August 2022, Volume 11, Number 3

Technical Analysis on the Cyber Organizational Criminology of Dictatorial Military Conducts -- Experience from Human Trafficking and Coercions by Military Cyber Aggressions
Yang Pachankis, Universal Life Church, USA

May 2022, Volume 11, Number 1/2

Enhanced Fuzzing System for Proactive Security Gap Exposure
Linlin Zhang and Ning Luo, Visual Computing Group, Intel Asia-Pacific Research & Development Ltd, China

May 2021, Volume 10, Number 2

GasMASk Annotation-based Code Generator as an Embedded Domain-Specific Language in Collaborative Multi-Agent Systems
Orcun Oruc and Uwe Aßmann, TU Dresden, Germany

February 2021, Volume 10, Number 1

Security and Privacy Perceptions among Female Online Social Media Users: A Case Study of Bangladesh
Farida Chowdhury, Sadia Sultana and Mahruba Sharmin Chowdhury, Shahjalal University of Science and Technology, Bangladesh


Editor in Chief

Editorial Board Members

... More

Related Resources

Privacy Symposium (PrivIno) 2026   International Conference on Data Governance, Regulatory Compliance, and Innovative Technologies
IEEE-ICECCS 2026   2025 IEEE International Conference on Electronics, Communications and Computer Science (ICECCS 2026)
IJSPTM 2026   International Journal of Security, Privacy and Trust Management
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
IJDMS 2026   International Journal of Database Management Systems
SNLP 2026   7thInternational Conference on Semantic & Natural Language Processing
BDCTA 2026   2026 2nd International Conference on Big Data, Communication Technology and Computer Applications
Ei/Scopus-CNIOT 2026   2026 7th IEEE International Conference on Computing, Networks and Internet of Things (CNIOT 2026)
IOTBC 2026   4th International Conference IOT, Blockchain and Cryptography
SCOM 2026   14th International Conference on Soft Computing