07.08.2012 Views

Computer & Communications Security Abstracts

Computer & Communications Security Abstracts

Computer & Communications Security Abstracts

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Publishers’ Charter<br />

<strong>Computer</strong> &<br />

<strong>Communications</strong> <strong>Security</strong><br />

<strong>Abstracts</strong><br />

www.emeraldinsight.com/abstracts/ccsa<br />

Research you can use


About <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong><br />

<strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> (CCSA) is a leading Abstracting and Indexing service,<br />

providing access to the latest computer & communications security knowledge. Only the world’s best<br />

journals and periodicals are selected for inclusion in the database, resulting in a coverage list of around<br />

100 of the most celebrated computer & communications security titles. The Accreditation board approves<br />

and signs off the primary journal coverage list on a yearly basis.<br />

CCSA covers all major subject areas including: biometric identification techniques; cryptography;<br />

electronic commerce security; intrusion detection; malicious software; network security and trusted third<br />

parties. CCSA does not claim to be the biggest, but the most selective: only periodicals of the highest<br />

order are included in the database.<br />

With CCSA, subscribers have access to the world’s best computer security abstracts and a search<br />

engine that is tailor-made to enable time-pressed researchers, students and business executives to<br />

locate the articles that best meet their requirements. The ease and speed of access and the advanced<br />

yet easy-to-use search facility make this collection an invaluable abstracting and indexing service.<br />

2


Accreditation by <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong><br />

International Database<br />

Who we are<br />

<strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> (CCSA) seeks to disseminate information about the best<br />

computer security literature in the world. <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> has been<br />

meeting the needs of security information professionals since 1992. Every year our editorial teams<br />

assess journals and periodicals from all over the world in order that the finest literature can be brought to<br />

the attention of our global customer base.<br />

The Accredited Journal List<br />

The CCSA accreditation process is both rigorous and effective. A composite list has been created<br />

comprising the journal holdings of computing centres of excellence renowned for their research acumen<br />

and ability to generate and share best practice. For example, Cambridge University and the Information<br />

<strong>Security</strong> Group of Royal Holloway and Bedford New College, London are among those which have<br />

contributed. The Accreditation Board, which comprises a group of internationally known experts in the<br />

field of security, also considers recommendations from users, together with their own experiences and<br />

expertise.<br />

Although we receive constant requests from publishers striving to have their publications accepted on to<br />

our coverage list, the vast majority are rejected as not meeting our high standards. Thus, only the world’s<br />

very best journals and periodicals are selected, resulting in a coverage list of around 100 of the most<br />

celebrated <strong>Computer</strong> & <strong>Communications</strong> security titles. The Accreditation Board then approves and signs<br />

off the primary journal coverage list on a yearly basis.<br />

Members of the Accreditation Board are recognized experts in their fields. For example, our expert in the<br />

field of cryptographic algorithms and protocols is Professor Bart Preneel, and Professor Alfred Menezes<br />

specializes in practice-oriented provable security.<br />

The Accreditation Board:<br />

Professor Dieter Gollmann Technische Universität Hamburg, Hamburg, Germany<br />

Professor Alfred Menezes Department of Combinatorics and Optimization,<br />

University of Waterloo, Canada<br />

Professor Bart Preneel Department of Electrical Engineering-ESAT/COSIC,<br />

Katholieke Universiteit Leuven, Belgium<br />

Professor Jean-Jacques Quisquater UCL Crypto-Group, Louvain-la-Neuve, Belgium<br />

Professor Steve Schneider Department of Computing, University of Surrey, UK<br />

Stafford Tavares Department of Electrical and <strong>Computer</strong> Engineering,<br />

Queen’s University, Canada<br />

Professor Vijay Varadharajan Microsoft Chair and Professor of Computing,<br />

Department of Computing, Macquarie University, Australia<br />

3


Building your brand<br />

Visibly celebrating your success<br />

In the competitive world of publishing, the instantly recognized title is usually the one that gains the sale.<br />

Put simply, if the quality of your content is not obvious, then you are losing out. CCSA provides a<br />

recognized seal of approval that customers trust; its independence and attention to detail are known by<br />

researchers, practitioners and librarians around the world.<br />

<strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> Accredited Journals<br />

You are able to use the Accredited Journal Badge as soon as you have been identified by<br />

the Accreditation Board as being outstanding and have signed your agreement with us. We<br />

only approach those journals that are recognized as being excellent in their field of<br />

computing and communications security research and we reject all other journal content.<br />

The badge separates you from the rest as being part of a service that covers only the best<br />

100 computer security journals in the world. Publishers of journals and periodicals included<br />

in the CCSA database use it on the journal, on their promotional materials and on their website.<br />

To collect this badge, contact Juliet Harrison: jharrison@emeraldinsight.com<br />

We also have more information about the accreditation process at:<br />

http://info.emeraldinsight.com/products/abstracts/about_lists.htm<br />

How publishers benefit<br />

As a publisher, inclusion in the CCSA service is a major boost to both sales and quality of content. On<br />

the sales and marketing side, tangible benefits include a huge boost to brand awareness, combined with<br />

the ability to sell licensed copies of articles within your target market – a method infinitely superior to the<br />

hit-and-miss effect of sample copies.<br />

How editors benefit<br />

Inclusion in the CCSA Accredited List means increased brand awareness for your journal and, for<br />

discerning authors, the knowledge that their paper will be widely disseminated and read by those who<br />

matter.<br />

4


Global dissemination of knowledge<br />

Bringing the world to your periodical<br />

Citation indexes, with all their inherent assumptions, are often the way in which the success of a journal<br />

is measured. If your title is not cited frequently enough, authors are reluctant to write for it. For journal<br />

publishers, including controlled circulation titles, being read is what matters. Inclusion in CCSA brings the<br />

world to your periodical. This section explains how.<br />

Ensuring that as many people as possible gain exposure to your journal<br />

A core value of the CCSA is that great attention is given to ensuring that only the best security journals<br />

are included. Having established this fact, we actively promote the list. The message being given to users<br />

and potential users is that these titles are the best in the world. This message is disseminated widely,<br />

using a tested marketing mix that draws on more than 40 years of accumulated experience.<br />

Promotional mix<br />

Emerald has long-standing, successful relationships with the major library agents around the world and<br />

other effective third parties. This distribution network has been built up over many years, with the CCSA<br />

relationship being highly prized. CCSA appears in advertising, agent and subject-specific brochures.<br />

Building awareness worldwide<br />

A key benefit of inclusion within CCSA has to be the massive boost it gives to awareness of your brand.<br />

<strong>Abstracts</strong> show-case individual articles, with full bibliographic details clearly indicating the source of the<br />

material. Full-text articles can then be ordered via our document delivery partners. If a publisher is a<br />

member of CrossRef, articles will be available online via DOI linking: if the user does not have a<br />

subscription to your periodical, the content can be purchased on a pay-per-view basis. If you prefer not to<br />

permit pay-per-view of your individual articles, users will not be permitted access.<br />

Full-text articles also may be available either online or in hard copy from Infotrieve. This again will<br />

depend on the publisher’s own agreement with Infotrieve. Royalty payments accrue for publishers every<br />

time a full-text article is downloaded, or a licensed photocopy is dispatched. If you do not have a direct<br />

agreement with Infotrieve, royalty payments will be made to you via the US Copyright Clearance Center<br />

or the UK Copyright Licensing Agency.<br />

Our liberal network licence means that academic institutions can provide access to students, both walk-in<br />

and campus, professors at their desktops and even distance learners.<br />

Multinational and transnational organizations can have the facility to network the product to use across<br />

branches and between countries. Access is no longer an issue in getting to know your journal.<br />

5


The <strong>Computer</strong> & <strong>Communications</strong> <strong>Security</strong> <strong>Abstracts</strong> Database<br />

Publishers’ Charter<br />

This is your charter. You should have high expectations of us. Signing the Charter welcomes you to the<br />

CCSA Accredited List of Publishers.<br />

Our promise to you:<br />

1. CCSA agrees that each abstract shall appear under a full citation to the journal.<br />

2. The rights to be a CCSA Accredited journal, including use of the logo in your periodical, your website<br />

and promotional literature.<br />

3. CCSA will make every reasonable effort to build awareness of your title, listing it within accredited<br />

journal coverage lists, making bibliographic and article abstract details available on subscription<br />

agents’ databases.<br />

4. Royalty payments for access to full-text articles are managed by our document delivery partners. You<br />

will have agreed the royalty per article separately with your preferred document delivery provider.<br />

5. Your full text articles will only be available via the method that you have agreed with our document<br />

delivery partners. Therefore, if you do not hold an electronic pay-per-view agreement with them, then<br />

your articles will not be made available in this way.<br />

6. A named contact person dedicated to providing you with efficient and courteous service.<br />

7. Inclusion within the database is non-exclusive. You are free to make the commercial decisions that<br />

are right for you.<br />

What we need from you<br />

In return for our Charter pledges, we need two actions from you:<br />

1. That you make available a complimentary subscription to our classificatory team, with issues<br />

dispatched in a timely manner after publication.<br />

2. That we be kept up to date with any changes affecting titles on the Accredited List – name changes,<br />

mergers, contact details and so on.<br />

What to do next<br />

Simply sign the enclosed agreement forms, returning one copy to us and retaining one copy for yourself.<br />

This form states that you have read and agree to the terms of the Publishers’ Charter. If you would like to<br />

discuss any matters relating to the Charter, please feel free to contact us.<br />

To discuss your preferred arrangement contact:<br />

Juliet Harrison<br />

Executive Editor<br />

Howard House<br />

Wagon Lane<br />

Bingley BD16 1WA<br />

UK<br />

Tel: +44 (0)1274 785087<br />

Fax: +44 (0)1274 785201<br />

E-mail: jharrison@emeraldinsight.com<br />

www.emeraldinsight.com/abstracts<br />

6


CCSA Accredited Journal list<br />

ACM Computing Surveys<br />

ACM Trans on <strong>Computer</strong> Systems<br />

ACM Transactions on Information and<br />

System <strong>Security</strong><br />

ACM Trans on Information Systems<br />

ACM Trans on Programming<br />

Languages and Systems<br />

ACM Trans on Software Engineering<br />

and Methodology<br />

Ad Hoc Networks<br />

Advances in Mathematics of<br />

<strong>Communications</strong><br />

Applicable Algebra in Engineering:<br />

Communication and Computing<br />

Bell Labs Technical Journal<br />

BT Technology Journal<br />

<strong>Communications</strong> of the ACM<br />

Complexity<br />

<strong>Computer</strong> Communication Review<br />

<strong>Computer</strong> <strong>Communications</strong><br />

<strong>Computer</strong> Fraud & <strong>Security</strong><br />

<strong>Computer</strong> Journal, The<br />

<strong>Computer</strong> Law and <strong>Security</strong> Review<br />

<strong>Computer</strong> Networks<br />

<strong>Computer</strong>s & <strong>Security</strong><br />

Cryptologia<br />

Designs, Codes and Cryptography<br />

Discrete Applied Mathematics<br />

Electronic Commerce Research<br />

Electronics Letters<br />

Ethics and Information Technology<br />

EURASIP Journal on Applied Signal<br />

Processing<br />

EURASIP Journal on Information<br />

<strong>Security</strong><br />

Formal Methods in System Design<br />

IET <strong>Communications</strong><br />

IET <strong>Computer</strong>s and Digital Techniques<br />

IET Information <strong>Security</strong><br />

IET Software<br />

IEEE/ACM Trans. on Networking<br />

IEEE <strong>Communications</strong> Letters<br />

IEEE <strong>Communications</strong> Magazine<br />

IEEE <strong>Computer</strong> Magazine<br />

IEEE Internet Computing<br />

IEEE Journal of Selected Areas in<br />

<strong>Communications</strong><br />

IEEE Network<br />

IEEE Pervasive Computing<br />

IEEE <strong>Security</strong> & Privacy Magazine<br />

IEEE Spectrum<br />

IEEE Trans. on <strong>Communications</strong><br />

IEEE Trans. on <strong>Computer</strong>s<br />

IEEE Transactions on Dependable and<br />

Secure Computing<br />

IEEE Trans. on Information Theory<br />

IEEE Transactions on Mobile<br />

Computing<br />

IEEE Transactions on Signal<br />

Processing<br />

IEEE Trans. on Software Engineering<br />

IEEE Transactions on Vehicular<br />

Technology<br />

IEEE Transactions on Wireless<br />

<strong>Communications</strong><br />

IEEE Wireless <strong>Communications</strong><br />

Information & <strong>Communications</strong><br />

Technology Law<br />

Information and Computation<br />

Information Management & <strong>Computer</strong><br />

<strong>Security</strong><br />

Information Processing Letters<br />

Information <strong>Security</strong><br />

Information <strong>Security</strong> Technical Report<br />

Information Systems Management<br />

Information Systems <strong>Security</strong><br />

Intelligence & National <strong>Security</strong><br />

International Journal of Information<br />

<strong>Security</strong><br />

Internet Research<br />

Journal of the ACM<br />

Journal of Algorithms<br />

Journal of Combinatorial Theory Series<br />

A<br />

Journal of <strong>Computer</strong> <strong>Security</strong><br />

Journal of <strong>Computer</strong> and System<br />

Sciences<br />

Journal of Cryptology<br />

Journal of Information Technology<br />

Journal of Information Warfare<br />

Journal of Internet Banking and<br />

Commerce<br />

Journal of Network and <strong>Computer</strong><br />

Applications<br />

Journal of Research and Practice in<br />

Information Technology<br />

Journal of Symbolic Computation<br />

Mathematics of Computation<br />

Mobile Networks and Applications<br />

Network <strong>Security</strong><br />

Operating Systems Review<br />

Pattern Recognition<br />

Pattern Recognition Letters<br />

Proceedings of the IEEE<br />

Random Structures and Algorithms<br />

SIAM Journal on Computing<br />

SIAM Journal on Discrete Mathematics<br />

Software Engineering Notes<br />

Telecommunication Systems<br />

Theoretical <strong>Computer</strong> Science<br />

Wireless Networks<br />

World Wide Web: Internet and Web<br />

Information Systems Journal<br />

Accredited Conferences<br />

ACISP: Australasian Conference on<br />

Information <strong>Security</strong> and Privacy<br />

ACSAC - Annual <strong>Computer</strong> <strong>Security</strong><br />

Applications Conference<br />

Asiacrypt<br />

CCS: ACM Conference on <strong>Computer</strong><br />

and <strong>Communications</strong> <strong>Security</strong><br />

CHES: Workshop on Cryptographic<br />

Hardware and Embedded Systems<br />

Cirencester: Cryptography and Coding<br />

IMA International Conference<br />

Crypto<br />

CSFW: <strong>Computer</strong> <strong>Security</strong><br />

Foundations Workshop<br />

ECC - Workshop on Elliptic Curve<br />

Cryptography<br />

e-SMART<br />

ESORICS: annual European<br />

Symposium on Research in <strong>Computer</strong><br />

<strong>Security</strong><br />

Eurocrypt<br />

Financial Cryptography<br />

FOCS: IEEE Annual Symposium on<br />

Foundations of <strong>Computer</strong> Science<br />

FSE: International Workshop on Fast<br />

Software Encryption<br />

GLOBECOM: IEEE Global<br />

Telecommunications Conference<br />

ICDCS: IEEE International Conference<br />

on Distributed Computing Systems<br />

ICICS: Information and<br />

<strong>Communications</strong> <strong>Security</strong><br />

ICISC: Information <strong>Security</strong> and<br />

Cryptology<br />

IEEE Symposium on <strong>Security</strong> and<br />

Privacy<br />

IFIP: International Information <strong>Security</strong><br />

Conference (IFIP)<br />

Indocrypt<br />

INFOCOM: IEEE Conference on<br />

<strong>Computer</strong> <strong>Communications</strong><br />

ISIT - IEEE International Symposium<br />

on Information Theory<br />

ISOC: Internet Society Symposium on<br />

Network and Distributed System<br />

<strong>Security</strong><br />

ISSE: Information <strong>Security</strong> Solutions<br />

Europe<br />

LCN: IEEE Annual Conference on<br />

Local <strong>Computer</strong> Networks<br />

NDSS: Network and Distributed<br />

Systems <strong>Security</strong> Symposium<br />

NSP: New <strong>Security</strong> Paradigms<br />

Workshop<br />

Provable <strong>Security</strong> Conference<br />

PKC: International Workshop on<br />

Practice and Theory in Public-Key<br />

Cryptography, Japan<br />

RAID - International Symposium on<br />

Recent Advances in Intrusion Detection<br />

RSA <strong>Security</strong>: Progress in Cryptology<br />

(The Cryptographers' Track at RSA)<br />

SAC: Workshop on Selected Areas in<br />

Cryptography<br />

SREIS - Symposium on Requirements<br />

Engineering for Information <strong>Security</strong><br />

STACS - Annual Symposium on<br />

Theoretical Aspects of <strong>Computer</strong><br />

Science<br />

STOC - ACM Annual Symposium on<br />

Theory of Computing<br />

USENIX <strong>Security</strong> Symposium<br />

WETICE - IEEE International<br />

Workshops on Enabling Technologies:<br />

Infrastructure for Collaborative<br />

Enterprises<br />

WISA - International Workshop on<br />

Information <strong>Security</strong> Applications<br />

Workshop on Information Hiding


Contact us today!<br />

Juliet Harrison, Emerald Group Publishing Limited, Howard House, Wagon Lane, Bingley BD16 1WA, United Kingdom<br />

Direct line: +44 (0)1274 785087 Switchboard: +44(0)1274 777700 Fax: +44 (0) 1274 785201<br />

E-mail: jharrison@emeraldinsight.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!