Authentication, Authorization and Auditing in Real-World Systems
EURASIP Journal on Information Security welcomes submissions to the thematic series on "Authentication, Authorization and Auditing in Real-World Systems"
In this special issue we want to explore security aspects of systems, in particular the new challenges that established concepts such as authentication, authorization and auditing face. To secure modern systems, many sub specializations of information security are necessary, among them network security, embedded software security and hardware security.
This special series originates from the 11th International Conference on Availability, Reliability and Security which was held in August 2016 at the University of Applied Sciences, Salzburg, Austria. Initially, it publishes some key contributions presented at the conference describing different aspects of availability, reliability and security with a focus on large-scale systems. Nevertheless, the special issue is also open for other contributions.
For this special issue we invite submissions that address security issues of AAA and look at some specific topics related to them. Extended conference submissions are permissible if (i) the original paper is clearly and explicitly referenced in the introduction and (ii) the new content is at least 40%.
The Special Issue will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. The ARES Conference is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map. The papers included in the Special Issue will highlight the various aspects of authentication, authorization and auditing. The Special Issue is open for all submissions and not restricted to ARES conference papers.
Potential topics include but are not limited to:
- Certificates, TLS
- Digital Forensics & Privacy
- Mobile Security
Before submitting your manuscript, please ensure you have carefully read the submission guidelines for EURASIP Journal on Information Security. The complete manuscript should be submitted through the EURASIP Journal on Information Security submission system. To ensure that you submit to the correct thematic series please select the appropriate thematic series in the drop-down menu upon submission. In addition, indicate within your cover letter that you wish your manuscript to be considered as part of the thematic series on "Authentication, Authorization and Auditing in Real-World Systems". All submissions will undergo rigorous peer review and accepted articles will be published within the journal as a collection.
Deadline for submissions: 13 February 2017
Lead Guest Editor
Edgar Weippl, SBA Research, Vienna University of Technology, Austria, Austria
- Rapid publication: Online submission, electronic peer review and production make the process of publishing your article simple and efficient
- High visibility and international readership in your field: Open access publication ensures high visibility and maximum exposure for your work - anyone with online access can read your article
- No space constraints: Publishing online means unlimited space for figures, extensive data and video footage
- Authors retain copyright, licensing the article under a Creative Commons license: articles can be freely redistributed and reused as long as the article is correctly attributed
For editorial enquiries please contact firstname.lastname@example.org
Sign up for article alerts to keep updated on articles published in EURASIP Journal on Information Security - including articles published in this thematic series!