Acm Transactions on Privacy and Security

Journal Title

  • Acm Transactions on Privacy and Security

ISSN

  • E 2471-2574 | P 2471-2566 | 2471-2566 | 2471-2574

Publisher

  • ASSOC COMPUTING MACHINERY

Listed on(Coverage)

JCR2017-2019
SJR2017-2019
CiteScore2018-2019
SCIE2016-2021
CC2016-2021
SCOPUS2018-2020

Active

  • Active

    based on the information

    • SCOPUS:2020-10

Country

  • USA

Aime & Scopes

  • ACM Transactions on Privacy and Security (TOPS) is devoted to the study, analysis, and application of information security and privacy. The journal takes a wide view of this topic and its mission is to publish the best original research in this area. Relevant topics of interest include: Security Technologies: authentication; authorization models and mechanisms; auditing and intrusion detection; cryptographic algorithms, protocols, services, and infrastructure; recovery and survivable operation; risk analysis; assurance including cryptanalysis and formal methods; penetration technologies including viruses, Trojan horses, spoofing, sniffing, cracking, and covert channels. Fundamentals: theory of security and privacy; models of trust; methods for quantifying the risk of the disclosure of private information or the risk a system will be compromised; mechanisms and algorithms that have wide application, including privacy models (e.g. k-anonymity based models and knowledge hiding models), and methods of secure communication with various properties (e.g. non-repudiation or forward secrecy). Secure Systems: secure operating systems, database systems and networks; secure distributed systems including security middleware; secure web browsers, servers, and mobile code; specialized secure systems for specific application areas; interoperability, and composition. Privacy Methods: methods to offer location privacy; anonymization techniques for users and their data; statistical disclosure control techniques; private information retrieval; protocols for secure multiparty communications, protecting confidential consumer data, and the like. Security and Privacy Applications: threats, system tradeoffs, and unique needs of applications; representative application areas include information systems, workflows, cloud computing, cyber-physical systems, electronic commerce, electronic cash, electronic voting, copyright and intellectual property protection, telecommunications systems, wireless systems, and health care. Design of security and privacy (user experience and usability). Privacy and Security Policies: confidentiality, integrity, availability, privacy, usage, and survivability policies; tradeoffs, conflicts and synergy among security and privacy objectives.

Article List

1 - 1 out of 1 results.

1

BROWSE