posted by user: zeroun || 9900 views || tracked by 15 users: [display]

Special Issue of The CJ (SCI indexed) 2013 : Special Issue on Security, Trust and Risk in Multimedia Social Networks of The Computer Journal

FacebookTwitterLinkedInGoogle

Link: http://www.oxfordjournals.org/our_journals/computer_journal/special.html#Special%20Issue%20on%20Security,%20Trust%20and%20Risk%20in%20Multimedia%20Social%20Networks
 
When N/A
Where N/A
Submission Deadline Sep 15, 2013
Notification Due Nov 15, 2013
Final Version Due Mar 15, 2014
Categories    social networks   security   trust management   digital rights management
 

Call For Papers

With the rapid development of network socialization, multimedia social networks (MSNs) have increasingly emerged. These MSNs offer network tools, services, and applications for multimedia contents (e.g. electronic book, digital image, audio and video) that can be shared among users in the same group or between different groups within social networks. Many MSNs are popular nowadays, such as video sharing networks YouTube and audio sharing network SongTaste etc. However, easy digital content reproduction and the convenient distribution and sharing of such contents facilitated by open MSNs environments have enabled people to share and distribute valuable copyrighted digital contents within social networks. The copyright infringement behaviors, such as illicit copying, malicious distribution, unauthorized usage, free sharing of copyright-protected digital contents, will also become a much more common phenomenon. Some research frontiers on media contents security in social networks applications have been in progress, including enhanced security mechanisms, methods and algorithms, trust assessment and risk management in social network applications, as well as social factors and soft computing in social media distributions.
The special issue attempts to bring together researchers, contents industry engineers and administrators resorting to the state-of-the-art technologies and ideas to protect valuable media contents and services against attacks and IP piracy in the emerging social networks. All submitted papers will be peer-reviewed and selected on the basis of both their quality and their relevance to the theme of this special issue.
**Submission Guidelines**
This special issue calls for original papers describing the latest developments, trends and solutions of active media technology and its applications. Topics of interests include, but are not limited to:
1) Preventative cryptography methods for multimedia contents security
2) Reactive watermarking and forensics approaches to multimedia content protection in social networks
3) Social distribution network architecture, modeling and simulation
4) IP, privacy and usage control for Multimedia Social Networks
5) Social computing for multimedia social networks
6) Trust management and trust assessment in social networks
7) Security risk management and soft computing in social network applications
8) Toward social network DRM application cases
Submitted papers should be submitted via The Computer Journal's online submission system, Manuscript Central, at http://mc.manuscriptcentral.com/compj. They should be accompanied by a cover letter that clearly states that the submission is for the Special Issue on “Security, Trust and Risk in Multimedia Social Networks”.
All submitted papers will be peer reviewed according to the usual standards of this journal, and will be evaluated on the basis of originality, quality and relevance to this Special Issue and the journal, and on the basis of clarity and correct use of English.
The submitted papers should be formatted according to the journal style. For more detailed information concerning the requirements for submission, please refer to the journal homepage at: www.oxfordjournals.org/our_journals/computer_journal/for_authors/msprep_submission.html
**Important Dates**
Paper submission: Sept. 15, 2013
1st round review notification: Nov. 15, 2013
1st revision due: Dec. 15, 2013
2nd round review notification: Jan. 15, 2014
2nd revision due: Feb. 30, 2014
Final acceptance: Mar. 15, 2014
Publication (tentative): 4th quarter, 2014
**Guest editors**
Assoc. Prof. Dr. Zhiyong Zhang (Corresponding GE)
Department of Computer Science, Henan University of Science & Technology, China
School of Management, Xi’an Jiaotong University, China
Website: www.sigdrm.org/~zzhang
Email: z.zhang@ieee.org, zerounzhang@mail.xjtu.edu.cn

Assoc. Prof. Dr. Muthucumaru Maheswaran
School of Computer Science, McGill University, Montreal, Canada
Website: http://www.cs.mcgill.ca/~maheswar
Email: maheswar@cs.mcgill.ca

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
IH&MMSec 2018   ACM Workshop on Information Hiding and Multimedia Security
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
CRiSIS 2017   12th International Conference on Risks and Security of Internet and Systems
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
BioSTAR 2018   3rd International Workshop on Bio-inspired Security, Trust, Assurance and Resilience
AI 2017   3rd International Conference on Artificial Intelligence and Applications
MLDM 2018   14th International Conference on Machine Learning and Data Mining MLDM 2018
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm