posted by organizer: rnakram || 6722 views || tracked by 15 users: [display]

FGC SI: SPT-UCS 2016 : Future Generation Computer Systems (Elsevier) Special issue on Security, Privacy and Trust of the User-centric Solutions


When N/A
Where N/A
Submission Deadline Sep 1, 2015
Notification Due Nov 15, 2015
Final Version Due Jan 31, 2016
Categories    security   privacy   computer science   user centric

Call For Papers

Future Generation Computer Systems (Elsevier)
Special issue on Security, Privacy and Trust of the User-centric Solutions

In future computing environments, due to the ongoing development of pervasive and smart technologies, movement towards user-centric solutions must be paramount. The frameworks for everyday personal computing devices, including smartphones, smart cards and sensors, are becoming user-centric instead of issuer-centric. User-centric solutions can target a wide range of applications, ranging from individual devices communicating with other connected devices, through to data-sharing in cloud computing and open grids on very powerful computing systems. User-centric solutions address the devices themselves and the ways in which they communicate, i.e., the networks and the end-user applications. The key factor in the success of user-centric solutions is the peace of mind of users. To achieve this the security, privacy and trust in the user-centric ecosystem for any device must be ensured.

This special issue aims to further scientific research within the field of security, privacy and trust for user-centric solutions. It will accept original research papers that report the latest results and advances in this area. It also invites review articles that focus on the state of the art in security, privacy and trust solutions for user-centric devices, network and applications, highlighting trends and challenges. The papers will be peer reviewed and will be selected on the basis of their quality and relevance to the topic of this special issue. Topics include (but are not limited to):

• Security, Privacy and Trust of:
◦ User-centric Devices (Smartphones, PDA, RFID, Sensors, Smart Cards, Smart Cameras, Smart Objects)
◦ User-centric Networks (Mobile Ad hoc Networks, M2M Networks, Urban Networks, Wireless Sensor Networks)
◦ User-centric Applications (Cloud Computing, Data Provenance, Smart Grids, Smart Homes, Healthcare, Smart Spaces, Convergent Pervasive and Smart Environments)
• Technologies used to enhance Security, Privacy and Trust in User-centric solutions (NFC, IPv6, TPM)
• Societal issues related to Security, Privacy and Trust in User-centric solutions (HCI, User interactions)

Submission Guidelines
Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journal or conference proceedings. Previously published or accepted conference papers must contain at least 30% new material to be considered for the special issue. Submitted papers should be formatted according to the journal style. For more detailed information concerning the requirements for submission, please refer to the complete Author Guidelines at:
Papers should be uploaded via journal online system: Authors must select “SI: SPT-UCS” when they reach the “Article Type” step in the submission process.

Selection and Evaluation Criteria
• Significance to the research community of the journal
• Relevance to the special issue
• Originality of research innovation, technical contribution, and significance of the presented results
• Quality, clarity, and readability of the written text
• Quality of references and related work
• Quality of research hypothesis, assertions, and conclusion

Important Dates
Full manuscript due: September 1, 2015
Notification of the first review process: November 15, 2015
Revision due: December 15, 2015
Final acceptance notification: January 15, 2016
Final manuscript due: January 31, 2016
Publication date: Summer 2016 (Tentative)

Journal Metrics
Source Normalized Impact per Paper (SNIP): 3.278
SCImago Journal Rank (SJR): 2.146
Impact Factor: 2.786
5-Year Impact Factor: 2.464

Lead Guest Editor
Raja Naeem Akram, Information Security Group, Royal Holloway, University of London. United Kingdom.

Guest Editors
Hsiao-Hwa Chen, Department of Engineering Science, National Cheng Kung University, Taiwan.
Javier Lopez, Computer Science Department, University of Malaga, Spain.
Damien Sauveron, XLIM (UMR CNRS 7252), University of Limoges, France.
Laurence T. Yang, Department of Computer Science, St. Francis Xavier University, Canada.

Related Resources

ICCV 2023   International Conference on Computer Vision
ACM-Ei/Scopus-CWCBD 2023   2023 4th International Conference on Wireless Communications and Big Data (CWCBD 2023) -EI Compendex
IEEE ICA 2022   The 6th IEEE International Conference on Agents
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
CGO 2023   ACM/IEEE International Symposium on Code Generation and Optimization
ACM-EI/Scopus-ITCC 2023   2023 3rd International Conference on Information Technology and Cloud Computing (ITCC 2023) -EI Compendex
CCGrid 2023   The 23rd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing
IEEE, EI, Scopus-CVIV 2023   2023 5th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2023) -EI Compendex
CVIPPR 2023   2023 Asia Conference on Computer Vision, Image Processing and Pattern Recognition (CVIPPR 2023)
MSE 2023   7th International Conference on Materials Science and Engineering