07.08.2012 Views

Computer & Communications Security Abstracts

Computer & Communications Security Abstracts

Computer & Communications Security Abstracts

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Publishers’ Charter<br />

<strong>Computer</strong> &<br />

<strong>Communications</strong> <strong>Security</strong><br />

<strong>Abstracts</strong><br />

www.emeraldinsight.com/abstracts/ccsa<br />

Research you can use


About <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong><br />

<strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> (CCSA) is a leading Abstracting and Indexing service,<br />

providing access to the latest computer & communications security knowledge. Only the world’s best<br />

journals and periodicals are selected for inclusion in the database, resulting in a coverage list of around<br />

100 of the most celebrated computer & communications security titles. The Accreditation board approves<br />

and signs off the primary journal coverage list on a yearly basis.<br />

CCSA covers all major subject areas including: biometric identification techniques; cryptography;<br />

electronic commerce security; intrusion detection; malicious software; network security and trusted third<br />

parties. CCSA does not claim to be the biggest, but the most selective: only periodicals of the highest<br />

order are included in the database.<br />

With CCSA, subscribers have access to the world’s best computer security abstracts and a search<br />

engine that is tailor-made to enable time-pressed researchers, students and business executives to<br />

locate the articles that best meet their requirements. The ease and speed of access and the advanced<br />

yet easy-to-use search facility make this collection an invaluable abstracting and indexing service.<br />

2


Accreditation by <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong><br />

International Database<br />

Who we are<br />

<strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> (CCSA) seeks to disseminate information about the best<br />

computer security literature in the world. <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> has been<br />

meeting the needs of security information professionals since 1992. Every year our editorial teams<br />

assess journals and periodicals from all over the world in order that the finest literature can be brought to<br />

the attention of our global customer base.<br />

The Accredited Journal List<br />

The CCSA accreditation process is both rigorous and effective. A composite list has been created<br />

comprising the journal holdings of computing centres of excellence renowned for their research acumen<br />

and ability to generate and share best practice. For example, Cambridge University and the Information<br />

<strong>Security</strong> Group of Royal Holloway and Bedford New College, London are among those which have<br />

contributed. The Accreditation Board, which comprises a group of internationally known experts in the<br />

field of security, also considers recommendations from users, together with their own experiences and<br />

expertise.<br />

Although we receive constant requests from publishers striving to have their publications accepted on to<br />

our coverage list, the vast majority are rejected as not meeting our high standards. Thus, only the world’s<br />

very best journals and periodicals are selected, resulting in a coverage list of around 100 of the most<br />

celebrated <strong>Computer</strong> & <strong>Communications</strong> security titles. The Accreditation Board then approves and signs<br />

off the primary journal coverage list on a yearly basis.<br />

Members of the Accreditation Board are recognized experts in their fields. For example, our expert in the<br />

field of cryptographic algorithms and protocols is Professor Bart Preneel, and Professor Alfred Menezes<br />

specializes in practice-oriented provable security.<br />

The Accreditation Board:<br />

Professor Dieter Gollmann Technische Universität Hamburg, Hamburg, Germany<br />

Professor Alfred Menezes Department of Combinatorics and Optimization,<br />

University of Waterloo, Canada<br />

Professor Bart Preneel Department of Electrical Engineering-ESAT/COSIC,<br />

Katholieke Universiteit Leuven, Belgium<br />

Professor Jean-Jacques Quisquater UCL Crypto-Group, Louvain-la-Neuve, Belgium<br />

Professor Steve Schneider Department of Computing, University of Surrey, UK<br />

Stafford Tavares Department of Electrical and <strong>Computer</strong> Engineering,<br />

Queen’s University, Canada<br />

Professor Vijay Varadharajan Microsoft Chair and Professor of Computing,<br />

Department of Computing, Macquarie University, Australia<br />

3


Building your brand<br />

Visibly celebrating your success<br />

In the competitive world of publishing, the instantly recognized title is usually the one that gains the sale.<br />

Put simply, if the quality of your content is not obvious, then you are losing out. CCSA provides a<br />

recognized seal of approval that customers trust; its independence and attention to detail are known by<br />

researchers, practitioners and librarians around the world.<br />

<strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> Accredited Journals<br />

You are able to use the Accredited Journal Badge as soon as you have been identified by<br />

the Accreditation Board as being outstanding and have signed your agreement with us. We<br />

only approach those journals that are recognized as being excellent in their field of<br />

computing and communications security research and we reject all other journal content.<br />

The badge separates you from the rest as being part of a service that covers only the best<br />

100 computer security journals in the world. Publishers of journals and periodicals included<br />

in the CCSA database use it on the journal, on their promotional materials and on their website.<br />

To collect this badge, contact Juliet Harrison: jharrison@emeraldinsight.com<br />

We also have more information about the accreditation process at:<br />

http://info.emeraldinsight.com/products/abstracts/about_lists.htm<br />

How publishers benefit<br />

As a publisher, inclusion in the CCSA service is a major boost to both sales and quality of content. On<br />

the sales and marketing side, tangible benefits include a huge boost to brand awareness, combined with<br />

the ability to sell licensed copies of articles within your target market – a method infinitely superior to the<br />

hit-and-miss effect of sample copies.<br />

How editors benefit<br />

Inclusion in the CCSA Accredited List means increased brand awareness for your journal and, for<br />

discerning authors, the knowledge that their paper will be widely disseminated and read by those who<br />

matter.<br />

4


Global dissemination of knowledge<br />

Bringing the world to your periodical<br />

Citation indexes, with all their inherent assumptions, are often the way in which the success of a journal<br />

is measured. If your title is not cited frequently enough, authors are reluctant to write for it. For journal<br />

publishers, including controlled circulation titles, being read is what matters. Inclusion in CCSA brings the<br />

world to your periodical. This section explains how.<br />

Ensuring that as many people as possible gain exposure to your journal<br />

A core value of the CCSA is that great attention is given to ensuring that only the best security journals<br />

are included. Having established this fact, we actively promote the list. The message being given to users<br />

and potential users is that these titles are the best in the world. This message is disseminated widely,<br />

using a tested marketing mix that draws on more than 40 years of accumulated experience.<br />

Promotional mix<br />

Emerald has long-standing, successful relationships with the major library agents around the world and<br />

other effective third parties. This distribution network has been built up over many years, with the CCSA<br />

relationship being highly prized. CCSA appears in advertising, agent and subject-specific brochures.<br />

Building awareness worldwide<br />

A key benefit of inclusion within CCSA has to be the massive boost it gives to awareness of your brand.<br />

<strong>Abstracts</strong> show-case individual articles, with full bibliographic details clearly indicating the source of the<br />

material. Full-text articles can then be ordered via our document delivery partners. If a publisher is a<br />

member of CrossRef, articles will be available online via DOI linking: if the user does not have a<br />

subscription to your periodical, the content can be purchased on a pay-per-view basis. If you prefer not to<br />

permit pay-per-view of your individual articles, users will not be permitted access.<br />

Full-text articles also may be available either online or in hard copy from Infotrieve. This again will<br />

depend on the publisher’s own agreement with Infotrieve. Royalty payments accrue for publishers every<br />

time a full-text article is downloaded, or a licensed photocopy is dispatched. If you do not have a direct<br />

agreement with Infotrieve, royalty payments will be made to you via the US Copyright Clearance Center<br />

or the UK Copyright Licensing Agency.<br />

Our liberal network licence means that academic institutions can provide access to students, both walk-in<br />

and campus, professors at their desktops and even distance learners.<br />

Multinational and transnational organizations can have the facility to network the product to use across<br />

branches and between countries. Access is no longer an issue in getting to know your journal.<br />

5


The <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> Database<br />

Publishers’ Charter<br />

This is your charter. You should have high expectations of us. Signing the Charter welcomes you to the<br />

CCSA Accredited List of Publishers.<br />

Our promise to you:<br />

1. CCSA agrees that each abstract shall appear under a full citation to the journal.<br />

2. The rights to be a CCSA Accredited journal, including use of the logo in your periodical, your website<br />

and promotional literature.<br />

3. CCSA will make every reasonable effort to build awareness of your title, listing it within accredited<br />

journal coverage lists, making bibliographic and article abstract details available on subscription<br />

agents’ databases.<br />

4. Royalty payments for access to full-text articles are managed by our document delivery partners. You<br />

will have agreed the royalty per article separately with your preferred document delivery provider.<br />

5. Your full text articles will only be available via the method that you have agreed with our document<br />

delivery partners. Therefore, if you do not hold an electronic pay-per-view agreement with them, then<br />

your articles will not be made available in this way.<br />

6. A named contact person dedicated to providing you with efficient and courteous service.<br />

7. Inclusion within the database is non-exclusive. You are free to make the commercial decisions that<br />

are right for you.<br />

What we need from you<br />

In return for our Charter pledges, we need two actions from you:<br />

1. That you make available a complimentary subscription to our classificatory team, with issues<br />

dispatched in a timely manner after publication.<br />

2. That we be kept up to date with any changes affecting titles on the Accredited List – name changes,<br />

mergers, contact details and so on.<br />

What to do next<br />

Simply sign the enclosed agreement forms, returning one copy to us and retaining one copy for yourself.<br />

This form states that you have read and agree to the terms of the Publishers’ Charter. If you would like to<br />

discuss any matters relating to the Charter, please feel free to contact us.<br />

To discuss your preferred arrangement contact:<br />

Juliet Harrison<br />

Executive Editor<br />

Howard House<br />

Wagon Lane<br />

Bingley BD16 1WA<br />

UK<br />

Tel: +44 (0)1274 785087<br />

Fax: +44 (0)1274 785201<br />

E-mail: jharrison@emeraldinsight.com<br />

www.emeraldinsight.com/abstracts<br />

6


CCSA Accredited Journal list<br />

ACM Computing Surveys<br />

ACM Trans on <strong>Computer</strong> Systems<br />

ACM Transactions on Information and<br />

System <strong>Security</strong><br />

ACM Trans on Information Systems<br />

ACM Trans on Programming<br />

Languages and Systems<br />

ACM Trans on Software Engineering<br />

and Methodology<br />

Ad Hoc Networks<br />

Advances in Mathematics of<br />

<strong>Communications</strong><br />

Applicable Algebra in Engineering:<br />

Communication and Computing<br />

Bell Labs Technical Journal<br />

BT Technology Journal<br />

<strong>Communications</strong> of the ACM<br />

Complexity<br />

<strong>Computer</strong> Communication Review<br />

<strong>Computer</strong> <strong>Communications</strong><br />

<strong>Computer</strong> Fraud & <strong>Security</strong><br />

<strong>Computer</strong> Journal, The<br />

<strong>Computer</strong> Law and <strong>Security</strong> Review<br />

<strong>Computer</strong> Networks<br />

<strong>Computer</strong>s & <strong>Security</strong><br />

Cryptologia<br />

Designs, Codes and Cryptography<br />

Discrete Applied Mathematics<br />

Electronic Commerce Research<br />

Electronics Letters<br />

Ethics and Information Technology<br />

EURASIP Journal on Applied Signal<br />

Processing<br />

EURASIP Journal on Information<br />

<strong>Security</strong><br />

Formal Methods in System Design<br />

IET <strong>Communications</strong><br />

IET <strong>Computer</strong>s and Digital Techniques<br />

IET Information <strong>Security</strong><br />

IET Software<br />

IEEE/ACM Trans. on Networking<br />

IEEE <strong>Communications</strong> Letters<br />

IEEE <strong>Communications</strong> Magazine<br />

IEEE <strong>Computer</strong> Magazine<br />

IEEE Internet Computing<br />

IEEE Journal of Selected Areas in<br />

<strong>Communications</strong><br />

IEEE Network<br />

IEEE Pervasive Computing<br />

IEEE <strong>Security</strong> & Privacy Magazine<br />

IEEE Spectrum<br />

IEEE Trans. on <strong>Communications</strong><br />

IEEE Trans. on <strong>Computer</strong>s<br />

IEEE Transactions on Dependable and<br />

Secure Computing<br />

IEEE Trans. on Information Theory<br />

IEEE Transactions on Mobile<br />

Computing<br />

IEEE Transactions on Signal<br />

Processing<br />

IEEE Trans. on Software Engineering<br />

IEEE Transactions on Vehicular<br />

Technology<br />

IEEE Transactions on Wireless<br />

<strong>Communications</strong><br />

IEEE Wireless <strong>Communications</strong><br />

Information & <strong>Communications</strong><br />

Technology Law<br />

Information and Computation<br />

Information Management & <strong>Computer</strong><br />

<strong>Security</strong><br />

Information Processing Letters<br />

Information <strong>Security</strong><br />

Information <strong>Security</strong> Technical Report<br />

Information Systems Management<br />

Information Systems <strong>Security</strong><br />

Intelligence & National <strong>Security</strong><br />

International Journal of Information<br />

<strong>Security</strong><br />

Internet Research<br />

Journal of the ACM<br />

Journal of Algorithms<br />

Journal of Combinatorial Theory Series<br />

A<br />

Journal of <strong>Computer</strong> <strong>Security</strong><br />

Journal of <strong>Computer</strong> and System<br />

Sciences<br />

Journal of Cryptology<br />

Journal of Information Technology<br />

Journal of Information Warfare<br />

Journal of Internet Banking and<br />

Commerce<br />

Journal of Network and <strong>Computer</strong><br />

Applications<br />

Journal of Research and Practice in<br />

Information Technology<br />

Journal of Symbolic Computation<br />

Mathematics of Computation<br />

Mobile Networks and Applications<br />

Network <strong>Security</strong><br />

Operating Systems Review<br />

Pattern Recognition<br />

Pattern Recognition Letters<br />

Proceedings of the IEEE<br />

Random Structures and Algorithms<br />

SIAM Journal on Computing<br />

SIAM Journal on Discrete Mathematics<br />

Software Engineering Notes<br />

Telecommunication Systems<br />

Theoretical <strong>Computer</strong> Science<br />

Wireless Networks<br />

World Wide Web: Internet and Web<br />

Information Systems Journal<br />

Accredited Conferences<br />

ACISP: Australasian Conference on<br />

Information <strong>Security</strong> and Privacy<br />

ACSAC - Annual <strong>Computer</strong> <strong>Security</strong><br />

Applications Conference<br />

Asiacrypt<br />

CCS: ACM Conference on <strong>Computer</strong><br />

and <strong>Communications</strong> <strong>Security</strong><br />

CHES: Workshop on Cryptographic<br />

Hardware and Embedded Systems<br />

Cirencester: Cryptography and Coding<br />

IMA International Conference<br />

Crypto<br />

CSFW: <strong>Computer</strong> <strong>Security</strong><br />

Foundations Workshop<br />

ECC - Workshop on Elliptic Curve<br />

Cryptography<br />

e-SMART<br />

ESORICS: annual European<br />

Symposium on Research in <strong>Computer</strong><br />

<strong>Security</strong><br />

Eurocrypt<br />

Financial Cryptography<br />

FOCS: IEEE Annual Symposium on<br />

Foundations of <strong>Computer</strong> Science<br />

FSE: International Workshop on Fast<br />

Software Encryption<br />

GLOBECOM: IEEE Global<br />

Telecommunications Conference<br />

ICDCS: IEEE International Conference<br />

on Distributed Computing Systems<br />

ICICS: Information and<br />

<strong>Communications</strong> <strong>Security</strong><br />

ICISC: Information <strong>Security</strong> and<br />

Cryptology<br />

IEEE Symposium on <strong>Security</strong> and<br />

Privacy<br />

IFIP: International Information <strong>Security</strong><br />

Conference (IFIP)<br />

Indocrypt<br />

INFOCOM: IEEE Conference on<br />

<strong>Computer</strong> <strong>Communications</strong><br />

ISIT - IEEE International Symposium<br />

on Information Theory<br />

ISOC: Internet Society Symposium on<br />

Network and Distributed System<br />

<strong>Security</strong><br />

ISSE: Information <strong>Security</strong> Solutions<br />

Europe<br />

LCN: IEEE Annual Conference on<br />

Local <strong>Computer</strong> Networks<br />

NDSS: Network and Distributed<br />

Systems <strong>Security</strong> Symposium<br />

NSP: New <strong>Security</strong> Paradigms<br />

Workshop<br />

Provable <strong>Security</strong> Conference<br />

PKC: International Workshop on<br />

Practice and Theory in Public-Key<br />

Cryptography, Japan<br />

RAID - International Symposium on<br />

Recent Advances in Intrusion Detection<br />

RSA <strong>Security</strong>: Progress in Cryptology<br />

(The Cryptographers' Track at RSA)<br />

SAC: Workshop on Selected Areas in<br />

Cryptography<br />

SREIS - Symposium on Requirements<br />

Engineering for Information <strong>Security</strong><br />

STACS - Annual Symposium on<br />

Theoretical Aspects of <strong>Computer</strong><br />

Science<br />

STOC - ACM Annual Symposium on<br />

Theory of Computing<br />

USENIX <strong>Security</strong> Symposium<br />

WETICE - IEEE International<br />

Workshops on Enabling Technologies:<br />

Infrastructure for Collaborative<br />

Enterprises<br />

WISA - International Workshop on<br />

Information <strong>Security</strong> Applications<br />

Workshop on Information Hiding


Contact us today!<br />

Juliet Harrison, Emerald Group Publishing Limited, Howard House, Wagon Lane, Bingley BD16 1WA, United Kingdom<br />

Direct line: +44 (0)1274 785087 Switchboard: +44(0)1274 777700 Fax: +44 (0) 1274 785201<br />

E-mail: jharrison@emeraldinsight.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!