posted by organizer: rnakram || 2384 views || tracked by 15 users: [display]

FGC SI: SPT-UCS 2016 : Future Generation Computer Systems (Elsevier) Special issue on Security, Privacy and Trust of the User-centric Solutions


When N/A
Where N/A
Submission Deadline Sep 1, 2015
Notification Due Nov 15, 2015
Final Version Due Jan 31, 2016
Categories    security   privacy   computer science   user centric

Call For Papers

Future Generation Computer Systems (Elsevier)
Special issue on Security, Privacy and Trust of the User-centric Solutions

In future computing environments, due to the ongoing development of pervasive and smart technologies, movement towards user-centric solutions must be paramount. The frameworks for everyday personal computing devices, including smartphones, smart cards and sensors, are becoming user-centric instead of issuer-centric. User-centric solutions can target a wide range of applications, ranging from individual devices communicating with other connected devices, through to data-sharing in cloud computing and open grids on very powerful computing systems. User-centric solutions address the devices themselves and the ways in which they communicate, i.e., the networks and the end-user applications. The key factor in the success of user-centric solutions is the peace of mind of users. To achieve this the security, privacy and trust in the user-centric ecosystem for any device must be ensured.

This special issue aims to further scientific research within the field of security, privacy and trust for user-centric solutions. It will accept original research papers that report the latest results and advances in this area. It also invites review articles that focus on the state of the art in security, privacy and trust solutions for user-centric devices, network and applications, highlighting trends and challenges. The papers will be peer reviewed and will be selected on the basis of their quality and relevance to the topic of this special issue. Topics include (but are not limited to):

• Security, Privacy and Trust of:
◦ User-centric Devices (Smartphones, PDA, RFID, Sensors, Smart Cards, Smart Cameras, Smart Objects)
◦ User-centric Networks (Mobile Ad hoc Networks, M2M Networks, Urban Networks, Wireless Sensor Networks)
◦ User-centric Applications (Cloud Computing, Data Provenance, Smart Grids, Smart Homes, Healthcare, Smart Spaces, Convergent Pervasive and Smart Environments)
• Technologies used to enhance Security, Privacy and Trust in User-centric solutions (NFC, IPv6, TPM)
• Societal issues related to Security, Privacy and Trust in User-centric solutions (HCI, User interactions)

Submission Guidelines
Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journal or conference proceedings. Previously published or accepted conference papers must contain at least 30% new material to be considered for the special issue. Submitted papers should be formatted according to the journal style. For more detailed information concerning the requirements for submission, please refer to the complete Author Guidelines at:
Papers should be uploaded via journal online system: Authors must select “SI: SPT-UCS” when they reach the “Article Type” step in the submission process.

Selection and Evaluation Criteria
• Significance to the research community of the journal
• Relevance to the special issue
• Originality of research innovation, technical contribution, and significance of the presented results
• Quality, clarity, and readability of the written text
• Quality of references and related work
• Quality of research hypothesis, assertions, and conclusion

Important Dates
Full manuscript due: September 1, 2015
Notification of the first review process: November 15, 2015
Revision due: December 15, 2015
Final acceptance notification: January 15, 2016
Final manuscript due: January 31, 2016
Publication date: Summer 2016 (Tentative)

Journal Metrics
Source Normalized Impact per Paper (SNIP): 3.278
SCImago Journal Rank (SJR): 2.146
Impact Factor: 2.786
5-Year Impact Factor: 2.464

Lead Guest Editor
Raja Naeem Akram, Information Security Group, Royal Holloway, University of London. United Kingdom.

Guest Editors
Hsiao-Hwa Chen, Department of Engineering Science, National Cheng Kung University, Taiwan.
Javier Lopez, Computer Science Department, University of Malaga, Spain.
Damien Sauveron, XLIM (UMR CNRS 7252), University of Limoges, France.
Laurence T. Yang, Department of Computer Science, St. Francis Xavier University, Canada.

Related Resources

ICML 2017   34th International Conference on Machine Learning
ICCV 2017   International Conference on Computer Vision
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
CAIP 2017   Computer Analysis of Images and Patterns
ICINCO 2017   International Conference on Informatics in Control, Automation and Robotics
IJE 2016   International Journal of Education
CGO 2017   International Symposium on Code Generation and Optimization
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
WACV 2017   IEEE Winter Conference on Applications of Computer Vision
ICMLSC - ACM 2017   2017 International Conference on Machine Learning and Soft Computing (ICMLSC 2017)--Ei, ISI and Scopus