The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

I.J. of Information and Computer Security (IJICS) Call for Papers

Mon, September 27, 2004Call For Papers

The Journal invites papers representing synergy between theory and practices to help policy makers and executives manage information and computer security and its related technologies.  It focuses on theory, design, implementation, analysis, and application of secure information and computer systems.

Computer security has been a major concern of technical community since 1950s. The ubiquity of Internet has engendered the prevalence of information sharing among networked users and organizations.  This has rendered countless invasions of privacy and security around the world. The risk of invasion has generated enormous concern on information and computer security among businesses, governments, legislators, academics, researchers, scientists, and the public.  The International Journal of Information and Computer Security aims to promote and coordinate developments of information and computer security in the fields of information technology, political science, informatics, sociology, engineering, and science.  The Journal invites papers representing synergy between theory and practices to help policy makers and executives manage information and computer security and its related technologies.  It focuses on theory, design, implementation, analysis, and application of secure information and computer systems.  Emphases will also be on the related social, political and economic issues as well as emerging issues of interest to legislators, professionals, researchers, academics, and technical community.  The IJICS publishes original and review papers, technical reports, case studies, conference reports, management reports, book reviews, notes, and commentaries.  We welcome both submissions and inquiries from potential authors. Questions should be addressed to the Editor-in-Chief, Prof. Dr. Eldon Y. Li, at eli@calpoly.edu.

To submit a paper, please follow the guidelines in the “Submission of papers” section described on the IJICS homepage at .  For special discount on journal subscription, please visit the URL at http://www.icebnet.org/journals/.

The coverage of IJICS includes, but is not limited to, the following subjects:

# Access controls
# Anti-cyberterrorism
# Assurance of service
# Computer crime prevention and detection
# Computer forensics
# Computer security
# Confidentiality protection
# Critical infrastructure management
# Critical computing and storage
# Cryptography and data protection
# Database and data security
# Denial of service protection
# E-commerce security
# E-surveillance
# Fraud detection and prevention
# Hacker and terrorist detection
# Healthcare security
# Information assurance
# Information ethics
# Information hiding
# Information privacy issues
# Information security
# Information security management
# Information sharing
# Information system security
# Information warfare
# Integrity of service
# Internet abuse prevention
# Internet security
# Malicious code detection
# Modeling of information technology security
# National security
# Network intruder prevention
# Network security
# Physical security
# Piracy controls
# Risk management
# Safety-critical systems
# Secure communication technology
# Secure computer systems
# Security control measures
# Security ethics
# Security management policies
# Security policy models and mechanisms
# Security risk analysis
# Security standards
# Security training
# Social, political, and economical issues
# Software and hardware architectures
# Total security management
# Transaction security
# Unauthorized access protection
# Virus/worm controls
# Web service security
# Wireless/Mobile network security

Get Your Degree with CERIAS