Journal information in easy print format (PDF) - Inderscience ...

inderscience.com

Journal information in easy print format (PDF) - Inderscience ...

International Journal of

Information and

Computer Security

© 2013 Inderscience Enterprises Ltd


Scope of the Journal

Computer security has been a major concern since the 1950s. The ubiquity of the

internet has engendered the prevalence of information sharing among networked

users and organisations. This has rendered possible countless invasions of

privacy/security worldwide. This risk has generated enormous concern about

information and computer security among businesses, governments, legislators,

academics, researchers, scientists and the public. IJICS is a double-blind refereed,

authoritative reference addressing development of information/computer security in

information technology, political science, informatics, sociology, engineering and

science.

Subject coverage:

The coverage of IJICS includes, but is not

limited to, the following subjects:

• Assurance of service

• Computer crime prevention and detection

• Computer forensics

• Computer security

• Confidentiality protection

• Cryptography and data protection

• Database and data security

• Denial of service protection

• E-commerce security

• E-surveillance

• Fraud detection and prevention

• Hacker and terrorist detection

• Information ethics

• Information privacy issues

• Information security

• Information sharing

• Information system security

• Information warfare

• Integrity of service

• Internet abuse

• Internet security

• Malicious code detection

• National security

• Network intruder prevention

• Network security

• Risk management

• Safety-critical systems

• Secure communication technology

• Secure computer systems

• Security control measures

• Security policy models and mechanisms

• Software and hardware architectures

• Transaction security

• Unauthorised access protection

• Virus/worm controls

• Wireless/mobile network security

International Journal of

Information and

Computer Security

www.inderscience.com/ijics

visit

www.inderscience.com


Members of the Editorial Board

Editor-In-Chief

Prof. Eldon Y. Li

National Chengchi

University, Taiwan

Executive Editor

Dr. Sandro Bologna

Fang Yu

National Chengchi

University, Taiwan

Editor At Large

Dr. Sandro Bologna

Italian Association of

Critical Infrastructures'

Experts (AIIC), Italy

Editorial Board

Prof. Dr. Ashok K.

Agrawala

University of Maryland,

USA

Prof. Dr. Massoud Amin

University of Minnesota,

USA

Dr. Vijay Atluri

Rutgers University, USA

Prof. Dr. Elisa Bertino

Purdue University, USA

Prof. Dr. Michael

Burmester

Florida State University,

USA

Dr. Daniel Canas

Wake Forest University,

USA

Dr. Jinjun Chen

University of Technology,

Sydney, Australia

Prof. Dr. Chin-Chen Chang

National Chung Cheng

University, Taiwan

Dr. Steve J. Chapin

Syracuse University, USA

Prof. Dr. Hsinchun Chen

University of Arizona, USA

Prof. Dr. George Davida

University of Wisconsin at

Milwaukee, USA

Prof. Dr. James A. Davis

Iowa State University, USA

Prof. Dr. Dorothy Denning

Naval Postgraduate

School, USA

Prof. Dr. Norihisa Doi

Chuo University, Japan

Dr. Deborah A. Frincke

Pacific Northwest National

Laboratory, USA

Mr. Anup K. Ghosh

Defense Advanced

Research Projects Agency,

USA

Dr. Thomas H. Hinke

NASA Ames Research

Center, USA

Dr. Vasant Honavar

Iowa State University, USA

Prof. Dr. Jing-Jang Hwang

Chang Gung University,

Taiwan

Prof. Dr. Hideki Imai

Chuo University, Japan

Prof. Dr. J. David Irwin

Auburn University, USA

Prof. Dr. Sushil Jajodia

George Mason University,

USA

Prof. Dr. Pradeep Khosla,

Carnegie Mellon University,

USA

Georgia T. Killcrece,

Carnegie Mellon University,

USA

Prof. Dr. Kwangjo Kim

Information and

Communications University,

Korea

Mr. David Ladd

Microsoft Corporation,

USA

Prof. Dr. Chi-Sung Laih

National Cheng Kung

University, Taiwan

Prof. Dr. Kwok-Yan Lam

Tsinghua University, China

Prof. Dr. Der-Tsai Lee

Academia Sinica, Taiwan

Prof. Dr. Ruby B. Lee

Princeton University, USA

Prof. Dr. Giancarlo

Martella

University of Milano, Italy

Dr. John D. McLean

Naval Research

Laboratory, USA

Prof. Dr. Silvio Micali

Massachusetts Institute

of Technology, USA

Prof. Dr. Les Miller

Iowa State University, USA

Prof. Dr. Günter Müller

Albert-Ludwig University

of Freiburg, USA

Prof. Dr. Rafail Ostrovsky

University of California at

Los Angeles, USA

Dr. Charles C. Palmer

IBM T.J. Watson Research

Center, USA

Prof. Dr. Josef Pieprzyk

Macquarie University,

Australia

Mr. Phillip A. Porras

SRI International, USA

Prof. Dr. Bart Preneel

Katholieke Universiteit

Leuven, Belgium

Prof. Dr. Sihan Qing

Chinese Academy of

Sciences, China

Prof. Dr. Douglas Reeves

North Carolina State

University, USA

Prof. Dr. Aviel Rubin

Johns Hopkins University,

USA

Prof. Dr. Rei Safavi-Naini

University of Wollongong,

Australia

Prof. Dr. Pierangela

Samarati

University of Milano, Italy

Prof. Dr. Shiuhpyng Shieh

National Chiao Tung

University, Taiwan

Prof. Dr. Edgar Sibley

George Mason University,

USA

Prof. Dr. Nigel Smart

University of Bristol, UK

Prof. Dr. Eugene Spafford

Purdue University, USA

Dr. Jessica Staddon

Palo Alto Research Center,

USA

Dr. Bhavani

Thuraisingham

NSF and Mitre, USA

Prof. Dr. T.C. Ting

University of Connecticut,

USA

Prof. Dr. Doug Tygar

University of California at

Berkeley, USA

Prof. Dr. Vijay

Varadharajan

Macquarie University,

Australia

Dr. Dan S. Wallach

Rice University, USA

Prof. Dr. Mathew J.

Warren

Deakin University, Australia

Prof. Dr. Johnny Wong

Iowa State University, USA

Dr. Avishai Wool

Tel Aviv University, Israel

Dr. Rebecca Wright

Rutgers University, USA

Prof. Dr. Chwan-Hwa

“John” Wu

Auburn University, USA

Prof. Dr. Shuang-Hua

Yang

Loughborough University,

UK

Prof. Dr. John Zeleznikow

Victoria University,

Australia

visit

www.inderscience.com


Content of Inaugural

Issue of IJICS

VOL. 1(1/2), 2006

Editorial: Information and computer

security in the Internet Age

Eldon Y. Li

Data security in location-aware

applications: an approach based on RBAC

Maria Luisa Damiani, Elisa Bertino and Paolo

Perlasca

Deflation-secure Web metering

Rob Johnson and Jessica Staddon

On the design, implementation and

application of an authorization architecture

for Web services

Sarath Indrakanti, Vijay Varadharajan and

Ritesh Aggarwal

Software fault tree and colored Petri net

based specification, design and

implementation of agent-based intrusion

detection systems

Guy Helmer, Johnny Wong, Mark Slagell,

Vasant Honavar, Les Miller, Yanxin Wang,

Xia Wang and Natalia Stakhanova

A geotemporal role-based authorization

system

Vijayalakshmi Atluri and Soon Ae Chun

A taxonomy of intrusion response systems

Natalia Stakhanova, Samik Basu and Johnny

Wong

A framework of security and safety

checking for Internet based control

systems

Lili Yang and Shuang-Hua Yang

An RSA-based (t, n) threshold proxy

signature scheme with freewill identities

Ya-Fen Chang and Chin-Chen Chang

Selection of an EAP Authentication Method

for a WLAN

Khidir M. Ali and Thomas J. Owens

Notes for intending authors


Methods of payment

To be completed by all subscribers

Terms are payment with order. Payment by

cheque, banker’s draft or credit card is

acceptable.

Name of subscriber

............................................................................

...........................................................................

Position ..............................................................

Institution ............................................................

Address ..............................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

Fax ......................................................................

E-mail .................................................................

Credit card type and number

............................................................................

............................................................................

Expiry date .........................................................

Three-digit security number

(on the reverse of the credit card) ......................

Signature.............................................................

Date ....................................................................

Please address subscription orders to the

address overleaf


Subscription order form

To find out the subscription rates for

International Journal of Information and

Computer Security (IJICS),

please go to

www.inderscience.com/ijics or

http://www.inderscience.com/subscribe.php

(for all Inderscience titles, including IJICS)

This form may be photocopied or

downloaded from

www.inderscience.com/www/ielsubsform2.pdf

Journals may be ordered online from

http://inderscience.metapress.com

Please address subscription orders to:

Inderscience Publishers (Order Dept.)

World Trade Centre Building II

29 Route de Pre-Bois,

Case Postale 856,

CH-1215 Genève 15,

SWITZERLAND

For rush orders please:

fax: +41-22-7910885 or

E-mail: subs@inderscience.com

Please enter the following regular

subscriptions to IJICS

Relevant

Inderscience Titles

International Journal of Business Information

Systems

International Journal of Electronic Business

International Journal of Enterprise Systems

Integration and Interoperability

International Journal of Information Integrity

International Journal of Information

Technology and Management

International Journal of Internet Protocol

Technology

International Journal of Mobile

Communications

International Journal of Mobile Network

Design and Innovation

International Journal of Radio Frequency

Identification Technology and Applications

International Journal of Risk Assessment and

Management

International Journal of Technology Policy

and Law

International Journal of Web Engineering

and Technology

........ subscriptions (Print or Online)

[delete as necessary]

........ subscriptions (Print and Online)


International Journal of Wireless and Mobile

Computing

These titles are part of a unique profile on:

INFORMATION SYSTEMS AND

TECHNOLOGY

Total cost ..........................................................

Methods of payment overleaf

For information about these titles and the

substantial portfolio of journals developed

by Inderscience, please visit the website

at: www.inderscience.com


Notes for Authors and Submission of Papers

Submitted papers should not have been previously published or be currently under

consideration for publication elsewhere.

All papers are refereed through a double-blind process. A guide for authors and other

relevant information for submitting papers are available on the Submission of Papers

section of the Inderscience website: please go to

Author Guidelines

(www.inderscience.com/guidelines)

To submit a paper, please go to

Submission of Papers

(http://www.inderscience.com/papers)

ALL PAPERS MUST BE SUBMITTED ONLINE. If you experience any problems

submitting your paper online, please contact submissions@inderscience.com, describing

the exact problem you experience.

(Please include in your email the title of the Journal)

© 2013 Inderscience Enterprises Ltd

ISSN: 1744-1765 (Print), ISSN: 1744-1773 (Online)

More magazines by this user
Similar magazines