Journal Information
Computers & Security
Impact Factor:

Call For Papers
Computers & Security is the most respected technical journal in the IT security field. Now in its 29th year, with a new editorial board and new regular features and columns, the journal is essential reading for IT security professionals around the world.

Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.

Subscribe today and see the benefits immediately!

• Our cutting edge research will help you secure and maintain the integrity of your systems
• We accept only the highest quality of papers ensuring that you receive the relevant and practical advice you need
• Our editorial board's collective expertise will save you from paying thousands of pounds to IT consultants
• We don't just highlight the threats, we give you the solutions
Last updated by Dou Sun in 2017-07-25
Special Issues
Special Issue on Security and Privacy for Edge Computing: Current Progress and Future Challenge
Submission Date: 2017-12-31

Edge computing is a revolutionary method to optimize cloud computing systems for tackling network bottlenecks. Its characteristic lies in that the data processing such as analytics and knowledge generation are performed at the periphery of the network, as close to the originating source as possible. Network latency can thus be improved. The communication bandwidth requirement between sensors and the data center can also be greatly reduced. Along with the benefits brought, there are numerous challenges we should take into account, especially with respect to data security and privacy. Various scenarios are highly correlated with sensitive data usage. For example, the sensor may need to collect sensitive information from data producer for some smart services. Meanwhile, peers in the edge computing network need to cooperate with each other for some sensitive jobs without the involvement of the data center. These scenarios result in a high concern from data producers in terms of potential information leakage and misuse, which may compromise their privacy. Meanwhile, edge computing utilizes a wide range of technologies including wireless sensor networks, mobile data acquisition, mobile signature analysis, peer-to-peer ad hoc networking, local cloud/fog computing, grid/mesh computing, dew computing, mobile edge computing, distributed data storage and retrieval, autonomic self-healing networks, augmented reality, and so on. It is not only of the great necessity but also technically challenging in applying advanced security mechanisms and/or cryptographic techniques to secure edge computing, may it be at the network architecture level, system design level, or implementation at each involved entities. The aim of this special issue is to present advances in security and privacy enhancing technologies, and provably secure cryptographic techniques, to address such challenges in this rapidly emerging field of edge computing. Topics of interest include (but are not limited to) the following subject categories: - Privacy-Enhancing Cryptographic Techniques - Authentication, auditing and accountability in Edge Computing - Access Control Mechanisms - Secure Data Analysis and Private Learning - Outsourced or Verifiable Computation - Security Model for Edge Computing - Security Architecture for Edge Computing - Secure Federation and Orchestration of Edge Devices - Secure Software-Defined Networking and Virtualization for Edge computing - Key Management for Edge Computing - Security in Content Delivery - Security in Crowdsourcing - Security in Grid Computing - Security in the Internet of Things - Security in Location Services - Security in Pervasive Systems - Sensor Network Security - Trust Management and Reputation Issues - Intrusion Detection in Edge Computing - Cyber-Physical Security of Edge Devices - Usable Security - Wireless and Mobile Security - Secure Mobile Application Development - Mobile (Cloud) User Authentication and Authorization - Multi-factor (Mobile) System - Security and Privacy in Mobile Edge Computing
Last updated by Dou Sun in 2017-09-15
Related Publications
Related Journals
CCFFull NameImpact FactorPublisherISSN
bJournal of Computer Security IOS Press0926-227X
Computer Law and Security Review0.373ELSEVIER0267-3649
cComputer Law & Security Review0.938ELSEVIER0267-3649
Computer Methods in Applied Mechanics and Engineering3.467ELSEVIER0045-7825
Computers and Electronics in Agriculture1.892ELSEVIER0168-1699
Swarm Intelligence and Numerical MethodsRational Publication0000-0000
Control Engineering Practice1.830ELSEVIER0967-0661
Computers & Mathematics with Applications1.398ELSEVIER0898-1221
cJournal of Internet Security DDSecure.Net Inc.1206-4890
aIEEE Transactions on Computers1.723IEEE0018-9340
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ccPCMPacific-Rim Conference on Multimedia2017-05-232017-07-012017-09-28
cICDF2CEAI International Conference on Digital Forensics & Cyber Crime2017-05-292017-07-202017-10-09
baa1NDSSAnnual Network & Distributed System Security Symposium2017-08-112017-09-182018-02-18
b2MICAIMexican International Conference on Artificial Intelligence2015-06-232015-07-252015-10-25
cba2WCNCIEEE Wireless Communications & Networking Conference2017-10-012017-12-152018-04-15
cTAPIARichard Tapia Celebration of Diversity in Computing Conference  2016-09-14
PRDCIEEE Pacific Rim International Symposium on Dependable Computing2016-07-152016-09-102017-01-22
ba*a1SODAACM-SIAM Symposium on Discrete Algorithms2017-07-06 2018-01-07
GCBGerman Conference on Bioinformatics2015-06-302015-07-312015-09-27
MSCIInternational Conference on Mathematics and Computers in Sciences and Industry2015-05-31 2015-08-17