Computer & Communications Security Abstracts
Computer & Communications Security Abstracts
Computer & Communications Security Abstracts
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Publishers’ Charter<br />
<strong>Computer</strong> &<br />
<strong>Communications</strong> <strong>Security</strong><br />
<strong>Abstracts</strong><br />
www.emeraldinsight.com/abstracts/ccsa<br />
Research you can use
About <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong><br />
<strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> (CCSA) is a leading Abstracting and Indexing service,<br />
providing access to the latest computer & communications security knowledge. Only the world’s best<br />
journals and periodicals are selected for inclusion in the database, resulting in a coverage list of around<br />
100 of the most celebrated computer & communications security titles. The Accreditation board approves<br />
and signs off the primary journal coverage list on a yearly basis.<br />
CCSA covers all major subject areas including: biometric identification techniques; cryptography;<br />
electronic commerce security; intrusion detection; malicious software; network security and trusted third<br />
parties. CCSA does not claim to be the biggest, but the most selective: only periodicals of the highest<br />
order are included in the database.<br />
With CCSA, subscribers have access to the world’s best computer security abstracts and a search<br />
engine that is tailor-made to enable time-pressed researchers, students and business executives to<br />
locate the articles that best meet their requirements. The ease and speed of access and the advanced<br />
yet easy-to-use search facility make this collection an invaluable abstracting and indexing service.<br />
2
Accreditation by <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong><br />
International Database<br />
Who we are<br />
<strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> (CCSA) seeks to disseminate information about the best<br />
computer security literature in the world. <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> has been<br />
meeting the needs of security information professionals since 1992. Every year our editorial teams<br />
assess journals and periodicals from all over the world in order that the finest literature can be brought to<br />
the attention of our global customer base.<br />
The Accredited Journal List<br />
The CCSA accreditation process is both rigorous and effective. A composite list has been created<br />
comprising the journal holdings of computing centres of excellence renowned for their research acumen<br />
and ability to generate and share best practice. For example, Cambridge University and the Information<br />
<strong>Security</strong> Group of Royal Holloway and Bedford New College, London are among those which have<br />
contributed. The Accreditation Board, which comprises a group of internationally known experts in the<br />
field of security, also considers recommendations from users, together with their own experiences and<br />
expertise.<br />
Although we receive constant requests from publishers striving to have their publications accepted on to<br />
our coverage list, the vast majority are rejected as not meeting our high standards. Thus, only the world’s<br />
very best journals and periodicals are selected, resulting in a coverage list of around 100 of the most<br />
celebrated <strong>Computer</strong> & <strong>Communications</strong> security titles. The Accreditation Board then approves and signs<br />
off the primary journal coverage list on a yearly basis.<br />
Members of the Accreditation Board are recognized experts in their fields. For example, our expert in the<br />
field of cryptographic algorithms and protocols is Professor Bart Preneel, and Professor Alfred Menezes<br />
specializes in practice-oriented provable security.<br />
The Accreditation Board:<br />
Professor Dieter Gollmann Technische Universität Hamburg, Hamburg, Germany<br />
Professor Alfred Menezes Department of Combinatorics and Optimization,<br />
University of Waterloo, Canada<br />
Professor Bart Preneel Department of Electrical Engineering-ESAT/COSIC,<br />
Katholieke Universiteit Leuven, Belgium<br />
Professor Jean-Jacques Quisquater UCL Crypto-Group, Louvain-la-Neuve, Belgium<br />
Professor Steve Schneider Department of Computing, University of Surrey, UK<br />
Stafford Tavares Department of Electrical and <strong>Computer</strong> Engineering,<br />
Queen’s University, Canada<br />
Professor Vijay Varadharajan Microsoft Chair and Professor of Computing,<br />
Department of Computing, Macquarie University, Australia<br />
3
Building your brand<br />
Visibly celebrating your success<br />
In the competitive world of publishing, the instantly recognized title is usually the one that gains the sale.<br />
Put simply, if the quality of your content is not obvious, then you are losing out. CCSA provides a<br />
recognized seal of approval that customers trust; its independence and attention to detail are known by<br />
researchers, practitioners and librarians around the world.<br />
<strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> Accredited Journals<br />
You are able to use the Accredited Journal Badge as soon as you have been identified by<br />
the Accreditation Board as being outstanding and have signed your agreement with us. We<br />
only approach those journals that are recognized as being excellent in their field of<br />
computing and communications security research and we reject all other journal content.<br />
The badge separates you from the rest as being part of a service that covers only the best<br />
100 computer security journals in the world. Publishers of journals and periodicals included<br />
in the CCSA database use it on the journal, on their promotional materials and on their website.<br />
To collect this badge, contact Juliet Harrison: jharrison@emeraldinsight.com<br />
We also have more information about the accreditation process at:<br />
http://info.emeraldinsight.com/products/abstracts/about_lists.htm<br />
How publishers benefit<br />
As a publisher, inclusion in the CCSA service is a major boost to both sales and quality of content. On<br />
the sales and marketing side, tangible benefits include a huge boost to brand awareness, combined with<br />
the ability to sell licensed copies of articles within your target market – a method infinitely superior to the<br />
hit-and-miss effect of sample copies.<br />
How editors benefit<br />
Inclusion in the CCSA Accredited List means increased brand awareness for your journal and, for<br />
discerning authors, the knowledge that their paper will be widely disseminated and read by those who<br />
matter.<br />
4
Global dissemination of knowledge<br />
Bringing the world to your periodical<br />
Citation indexes, with all their inherent assumptions, are often the way in which the success of a journal<br />
is measured. If your title is not cited frequently enough, authors are reluctant to write for it. For journal<br />
publishers, including controlled circulation titles, being read is what matters. Inclusion in CCSA brings the<br />
world to your periodical. This section explains how.<br />
Ensuring that as many people as possible gain exposure to your journal<br />
A core value of the CCSA is that great attention is given to ensuring that only the best security journals<br />
are included. Having established this fact, we actively promote the list. The message being given to users<br />
and potential users is that these titles are the best in the world. This message is disseminated widely,<br />
using a tested marketing mix that draws on more than 40 years of accumulated experience.<br />
Promotional mix<br />
Emerald has long-standing, successful relationships with the major library agents around the world and<br />
other effective third parties. This distribution network has been built up over many years, with the CCSA<br />
relationship being highly prized. CCSA appears in advertising, agent and subject-specific brochures.<br />
Building awareness worldwide<br />
A key benefit of inclusion within CCSA has to be the massive boost it gives to awareness of your brand.<br />
<strong>Abstracts</strong> show-case individual articles, with full bibliographic details clearly indicating the source of the<br />
material. Full-text articles can then be ordered via our document delivery partners. If a publisher is a<br />
member of CrossRef, articles will be available online via DOI linking: if the user does not have a<br />
subscription to your periodical, the content can be purchased on a pay-per-view basis. If you prefer not to<br />
permit pay-per-view of your individual articles, users will not be permitted access.<br />
Full-text articles also may be available either online or in hard copy from Infotrieve. This again will<br />
depend on the publisher’s own agreement with Infotrieve. Royalty payments accrue for publishers every<br />
time a full-text article is downloaded, or a licensed photocopy is dispatched. If you do not have a direct<br />
agreement with Infotrieve, royalty payments will be made to you via the US Copyright Clearance Center<br />
or the UK Copyright Licensing Agency.<br />
Our liberal network licence means that academic institutions can provide access to students, both walk-in<br />
and campus, professors at their desktops and even distance learners.<br />
Multinational and transnational organizations can have the facility to network the product to use across<br />
branches and between countries. Access is no longer an issue in getting to know your journal.<br />
5
The <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> Database<br />
Publishers’ Charter<br />
This is your charter. You should have high expectations of us. Signing the Charter welcomes you to the<br />
CCSA Accredited List of Publishers.<br />
Our promise to you:<br />
1. CCSA agrees that each abstract shall appear under a full citation to the journal.<br />
2. The rights to be a CCSA Accredited journal, including use of the logo in your periodical, your website<br />
and promotional literature.<br />
3. CCSA will make every reasonable effort to build awareness of your title, listing it within accredited<br />
journal coverage lists, making bibliographic and article abstract details available on subscription<br />
agents’ databases.<br />
4. Royalty payments for access to full-text articles are managed by our document delivery partners. You<br />
will have agreed the royalty per article separately with your preferred document delivery provider.<br />
5. Your full text articles will only be available via the method that you have agreed with our document<br />
delivery partners. Therefore, if you do not hold an electronic pay-per-view agreement with them, then<br />
your articles will not be made available in this way.<br />
6. A named contact person dedicated to providing you with efficient and courteous service.<br />
7. Inclusion within the database is non-exclusive. You are free to make the commercial decisions that<br />
are right for you.<br />
What we need from you<br />
In return for our Charter pledges, we need two actions from you:<br />
1. That you make available a complimentary subscription to our classificatory team, with issues<br />
dispatched in a timely manner after publication.<br />
2. That we be kept up to date with any changes affecting titles on the Accredited List – name changes,<br />
mergers, contact details and so on.<br />
What to do next<br />
Simply sign the enclosed agreement forms, returning one copy to us and retaining one copy for yourself.<br />
This form states that you have read and agree to the terms of the Publishers’ Charter. If you would like to<br />
discuss any matters relating to the Charter, please feel free to contact us.<br />
To discuss your preferred arrangement contact:<br />
Juliet Harrison<br />
Executive Editor<br />
Howard House<br />
Wagon Lane<br />
Bingley BD16 1WA<br />
UK<br />
Tel: +44 (0)1274 785087<br />
Fax: +44 (0)1274 785201<br />
E-mail: jharrison@emeraldinsight.com<br />
www.emeraldinsight.com/abstracts<br />
6
CCSA Accredited Journal list<br />
ACM Computing Surveys<br />
ACM Trans on <strong>Computer</strong> Systems<br />
ACM Transactions on Information and<br />
System <strong>Security</strong><br />
ACM Trans on Information Systems<br />
ACM Trans on Programming<br />
Languages and Systems<br />
ACM Trans on Software Engineering<br />
and Methodology<br />
Ad Hoc Networks<br />
Advances in Mathematics of<br />
<strong>Communications</strong><br />
Applicable Algebra in Engineering:<br />
Communication and Computing<br />
Bell Labs Technical Journal<br />
BT Technology Journal<br />
<strong>Communications</strong> of the ACM<br />
Complexity<br />
<strong>Computer</strong> Communication Review<br />
<strong>Computer</strong> <strong>Communications</strong><br />
<strong>Computer</strong> Fraud & <strong>Security</strong><br />
<strong>Computer</strong> Journal, The<br />
<strong>Computer</strong> Law and <strong>Security</strong> Review<br />
<strong>Computer</strong> Networks<br />
<strong>Computer</strong>s & <strong>Security</strong><br />
Cryptologia<br />
Designs, Codes and Cryptography<br />
Discrete Applied Mathematics<br />
Electronic Commerce Research<br />
Electronics Letters<br />
Ethics and Information Technology<br />
EURASIP Journal on Applied Signal<br />
Processing<br />
EURASIP Journal on Information<br />
<strong>Security</strong><br />
Formal Methods in System Design<br />
IET <strong>Communications</strong><br />
IET <strong>Computer</strong>s and Digital Techniques<br />
IET Information <strong>Security</strong><br />
IET Software<br />
IEEE/ACM Trans. on Networking<br />
IEEE <strong>Communications</strong> Letters<br />
IEEE <strong>Communications</strong> Magazine<br />
IEEE <strong>Computer</strong> Magazine<br />
IEEE Internet Computing<br />
IEEE Journal of Selected Areas in<br />
<strong>Communications</strong><br />
IEEE Network<br />
IEEE Pervasive Computing<br />
IEEE <strong>Security</strong> & Privacy Magazine<br />
IEEE Spectrum<br />
IEEE Trans. on <strong>Communications</strong><br />
IEEE Trans. on <strong>Computer</strong>s<br />
IEEE Transactions on Dependable and<br />
Secure Computing<br />
IEEE Trans. on Information Theory<br />
IEEE Transactions on Mobile<br />
Computing<br />
IEEE Transactions on Signal<br />
Processing<br />
IEEE Trans. on Software Engineering<br />
IEEE Transactions on Vehicular<br />
Technology<br />
IEEE Transactions on Wireless<br />
<strong>Communications</strong><br />
IEEE Wireless <strong>Communications</strong><br />
Information & <strong>Communications</strong><br />
Technology Law<br />
Information and Computation<br />
Information Management & <strong>Computer</strong><br />
<strong>Security</strong><br />
Information Processing Letters<br />
Information <strong>Security</strong><br />
Information <strong>Security</strong> Technical Report<br />
Information Systems Management<br />
Information Systems <strong>Security</strong><br />
Intelligence & National <strong>Security</strong><br />
International Journal of Information<br />
<strong>Security</strong><br />
Internet Research<br />
Journal of the ACM<br />
Journal of Algorithms<br />
Journal of Combinatorial Theory Series<br />
A<br />
Journal of <strong>Computer</strong> <strong>Security</strong><br />
Journal of <strong>Computer</strong> and System<br />
Sciences<br />
Journal of Cryptology<br />
Journal of Information Technology<br />
Journal of Information Warfare<br />
Journal of Internet Banking and<br />
Commerce<br />
Journal of Network and <strong>Computer</strong><br />
Applications<br />
Journal of Research and Practice in<br />
Information Technology<br />
Journal of Symbolic Computation<br />
Mathematics of Computation<br />
Mobile Networks and Applications<br />
Network <strong>Security</strong><br />
Operating Systems Review<br />
Pattern Recognition<br />
Pattern Recognition Letters<br />
Proceedings of the IEEE<br />
Random Structures and Algorithms<br />
SIAM Journal on Computing<br />
SIAM Journal on Discrete Mathematics<br />
Software Engineering Notes<br />
Telecommunication Systems<br />
Theoretical <strong>Computer</strong> Science<br />
Wireless Networks<br />
World Wide Web: Internet and Web<br />
Information Systems Journal<br />
Accredited Conferences<br />
ACISP: Australasian Conference on<br />
Information <strong>Security</strong> and Privacy<br />
ACSAC - Annual <strong>Computer</strong> <strong>Security</strong><br />
Applications Conference<br />
Asiacrypt<br />
CCS: ACM Conference on <strong>Computer</strong><br />
and <strong>Communications</strong> <strong>Security</strong><br />
CHES: Workshop on Cryptographic<br />
Hardware and Embedded Systems<br />
Cirencester: Cryptography and Coding<br />
IMA International Conference<br />
Crypto<br />
CSFW: <strong>Computer</strong> <strong>Security</strong><br />
Foundations Workshop<br />
ECC - Workshop on Elliptic Curve<br />
Cryptography<br />
e-SMART<br />
ESORICS: annual European<br />
Symposium on Research in <strong>Computer</strong><br />
<strong>Security</strong><br />
Eurocrypt<br />
Financial Cryptography<br />
FOCS: IEEE Annual Symposium on<br />
Foundations of <strong>Computer</strong> Science<br />
FSE: International Workshop on Fast<br />
Software Encryption<br />
GLOBECOM: IEEE Global<br />
Telecommunications Conference<br />
ICDCS: IEEE International Conference<br />
on Distributed Computing Systems<br />
ICICS: Information and<br />
<strong>Communications</strong> <strong>Security</strong><br />
ICISC: Information <strong>Security</strong> and<br />
Cryptology<br />
IEEE Symposium on <strong>Security</strong> and<br />
Privacy<br />
IFIP: International Information <strong>Security</strong><br />
Conference (IFIP)<br />
Indocrypt<br />
INFOCOM: IEEE Conference on<br />
<strong>Computer</strong> <strong>Communications</strong><br />
ISIT - IEEE International Symposium<br />
on Information Theory<br />
ISOC: Internet Society Symposium on<br />
Network and Distributed System<br />
<strong>Security</strong><br />
ISSE: Information <strong>Security</strong> Solutions<br />
Europe<br />
LCN: IEEE Annual Conference on<br />
Local <strong>Computer</strong> Networks<br />
NDSS: Network and Distributed<br />
Systems <strong>Security</strong> Symposium<br />
NSP: New <strong>Security</strong> Paradigms<br />
Workshop<br />
Provable <strong>Security</strong> Conference<br />
PKC: International Workshop on<br />
Practice and Theory in Public-Key<br />
Cryptography, Japan<br />
RAID - International Symposium on<br />
Recent Advances in Intrusion Detection<br />
RSA <strong>Security</strong>: Progress in Cryptology<br />
(The Cryptographers' Track at RSA)<br />
SAC: Workshop on Selected Areas in<br />
Cryptography<br />
SREIS - Symposium on Requirements<br />
Engineering for Information <strong>Security</strong><br />
STACS - Annual Symposium on<br />
Theoretical Aspects of <strong>Computer</strong><br />
Science<br />
STOC - ACM Annual Symposium on<br />
Theory of Computing<br />
USENIX <strong>Security</strong> Symposium<br />
WETICE - IEEE International<br />
Workshops on Enabling Technologies:<br />
Infrastructure for Collaborative<br />
Enterprises<br />
WISA - International Workshop on<br />
Information <strong>Security</strong> Applications<br />
Workshop on Information Hiding
Contact us today!<br />
Juliet Harrison, Emerald Group Publishing Limited, Howard House, Wagon Lane, Bingley BD16 1WA, United Kingdom<br />
Direct line: +44 (0)1274 785087 Switchboard: +44(0)1274 777700 Fax: +44 (0) 1274 785201<br />
E-mail: jharrison@emeraldinsight.com