CFP: Security and Communication Networks (Wiley) Special Issue on Trusted Network Computing
CALL FOR PAPERS
Security and Communication Networks (Wiley)
Special Issue on Trusted Network Computing
With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security, and privacy are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security, and privacy at the same time. As useful and innovative technologies, trusted computing and communications are attracting researchers with more and more attention in communication networks.
The main objective of the special issue is to provide an ideal international communication medium for the research community and facilitate the enhancement of the findings in the rapidly developed fields of trusted network computing.
Topics of particular interests include (but are not limited to) the following:
- Trusted communication protocols.
- Trusted network management.
- Trusted network configurations.
- Trusted network architectures.
- Trusted end-host securing.
- Federated, heterogeneous, and distributed computing in trusted network environments.
- Trust in mobile and wireless communications.
- Trust in e-commerce and e-government.
- Trust in social networks.
Submitted papers should not be considered elsewhere for publication and the authors must follow the guidelines for preparation of the manuscripts. The language of the journal is English; 12-point type in one of the standard fonts, Times, Helvetica, or Courier is preferred. The paper length should not exceed 20 pages total including all figures and illustrations. It is not necessary for authors to double-line space their manuscript. Tables must be on separate pages after the reference list and not be incorporated into the main text. Figures should be uploaded as separate figure files. For manuscript submission authors should follow the guidelines described in Section "For Authors" at wileyonlinelibrary.com/journal/security. Prospective authors should submit their paper online at mc.manuscriptcentral.com/scn. When submitting the papers, the authors should make sure to choose the Manuscript type as "Special Issue", enter the "Running Head" and the "Special Issue title" as "SCN-SI-53" and "TrustedNetwork Computing", respectively.
Submission Due Date: Janurary 31, 2013 (EXTENDED DEADLINE)
First-Round Review Notification: March 31, 2013
Revision Due Date: April 30, 3013
Final Decision Date: May 31, 2013
Yulei Wu, Computer Network Information Center, Chinese Academy of Sciences, China (wuyulei AT cstnet DOT cn)
Guojun Wang, Department of Computer, Science, Central South University, China
Geyong Min, School of Computing, Informatics and Media, University of Bradford, UK
Ahmed Al-Dubai, School of Computing, Edinburgh Napier University, UK