SlideShare a Scribd company logo
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ISSN 2277 – 5498 [Online]; 2319 – 4103 [Print]
http://airccse.org/journal/ijsptm/index.html
Call for papers
With the simplicity of transmission of data over the web increasing, there has more prominent need for
adequate security mechanisms. Trust management is essential to the security framework of any network.
In most traditional networks both wired and wireless centralized entities play pivotal roles in trust
management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open
access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that
needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Topics of Interest
 Trust, Security, Privacy, Policy management
 Agent Based Trust Management
 Authorization, Authentication and Identity Management
 Pervasive Computation Trust
 Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust
 Decentralized Trust Management
 Trust in Service-Oriented Architecture- Open Architecture and Services
 Social Networks & Web 2.0 Trust Management
 Trust Management system for Wireless, mobile and sensor networks
 Policy of Trust in E-leaning systems
 Trust/risk based security frameworks
 Trust Management for virtual organizations
 Trust and Reputation Management
 Multimedia Content Management
Paper Submission
Authors are invited to Submit papers for this journal through the Email: ijsptm@aircconline.com or
through Submission System. Submissions must be original and should not have been published previously
or be under consideration for publication while being evaluated for this Journal. For paper format
download the template in this page
Important Dates
 Submission Deadline : June 04, 2024
 Notification : July 04, 2024
 Final Manuscript Due : July 11, 2024
 Publication Date : Determined by the Editor-in-Chief
Contact us
Here's where you can reach us : ijsptm@aircconline.com or ijsptmjournal@yahoo.com

More Related Content

Similar to International Journal of Security, Privacy and Trust Management (IJSPTM)

International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Security, Privacy and Trust Management (IJSPTM)International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Security, Privacy and Trust Management (IJSPTM)
ClaraZara1
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
lmgangi
 
Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...
IJNSA Journal
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...
IJNSA Journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...
ijseajournal
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
journalBEEI
 
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
ijcisjournal
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
Felipe Prado
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
Ideba
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
IRJET Journal
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
ijcisjournal
 
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTSTRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
ijp2p
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Marco Essomba
 
Ijisa
IjisaIjisa
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
Advanced Technology Consulting (ATC)
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
ebuc
 

Similar to International Journal of Security, Privacy and Trust Management (IJSPTM) (20)

International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Security, Privacy and Trust Management (IJSPTM)International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Security, Privacy and Trust Management (IJSPTM)
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
 
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTSTRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Ijisa
IjisaIjisa
Ijisa
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 

More from ClaraZara1

12th International Conference on Artificial Intelligence, Soft Computing (AIS...
12th International Conference on Artificial Intelligence, Soft Computing (AIS...12th International Conference on Artificial Intelligence, Soft Computing (AIS...
12th International Conference on Artificial Intelligence, Soft Computing (AIS...
ClaraZara1
 
16th International Conference on Wireless & Mobile Networks (WiMoNe 2024)
16th International Conference on Wireless & Mobile Networks (WiMoNe 2024)16th International Conference on Wireless & Mobile Networks (WiMoNe 2024)
16th International Conference on Wireless & Mobile Networks (WiMoNe 2024)
ClaraZara1
 
“CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENT...
“CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENT...“CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENT...
“CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENT...
ClaraZara1
 
Analysis of Media Discourse on Intellectual Property Rights Related to Metave...
Analysis of Media Discourse on Intellectual Property Rights Related to Metave...Analysis of Media Discourse on Intellectual Property Rights Related to Metave...
Analysis of Media Discourse on Intellectual Property Rights Related to Metave...
ClaraZara1
 
International Conference on Information Technology Convergence Services & AI ...
International Conference on Information Technology Convergence Services & AI ...International Conference on Information Technology Convergence Services & AI ...
International Conference on Information Technology Convergence Services & AI ...
ClaraZara1
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...
ClaraZara1
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
ClaraZara1
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
ClaraZara1
 
10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)
ClaraZara1
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
ClaraZara1
 
8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)
ClaraZara1
 
10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...
ClaraZara1
 
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond HillDOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
ClaraZara1
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)
ClaraZara1
 
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
ClaraZara1
 
An Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn ModelAn Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn Model
ClaraZara1
 
10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)
ClaraZara1
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
ClaraZara1
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
ClaraZara1
 

More from ClaraZara1 (20)

12th International Conference on Artificial Intelligence, Soft Computing (AIS...
12th International Conference on Artificial Intelligence, Soft Computing (AIS...12th International Conference on Artificial Intelligence, Soft Computing (AIS...
12th International Conference on Artificial Intelligence, Soft Computing (AIS...
 
16th International Conference on Wireless & Mobile Networks (WiMoNe 2024)
16th International Conference on Wireless & Mobile Networks (WiMoNe 2024)16th International Conference on Wireless & Mobile Networks (WiMoNe 2024)
16th International Conference on Wireless & Mobile Networks (WiMoNe 2024)
 
“CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENT...
“CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENT...“CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENT...
“CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENT...
 
Analysis of Media Discourse on Intellectual Property Rights Related to Metave...
Analysis of Media Discourse on Intellectual Property Rights Related to Metave...Analysis of Media Discourse on Intellectual Property Rights Related to Metave...
Analysis of Media Discourse on Intellectual Property Rights Related to Metave...
 
International Conference on Information Technology Convergence Services & AI ...
International Conference on Information Technology Convergence Services & AI ...International Conference on Information Technology Convergence Services & AI ...
International Conference on Information Technology Convergence Services & AI ...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
 
8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)
 
10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...
 
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond HillDOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)
 
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
 
An Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn ModelAn Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn Model
 
10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 

Recently uploaded

Flow Through Pipe: the analysis of fluid flow within pipes
Flow Through Pipe:  the analysis of fluid flow within pipesFlow Through Pipe:  the analysis of fluid flow within pipes
Flow Through Pipe: the analysis of fluid flow within pipes
Indrajeet sahu
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
IJCNCJournal
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
DharmaBanothu
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
LokerXu2
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Dr.Costas Sachpazis
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
nonods
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 

Recently uploaded (20)

Flow Through Pipe: the analysis of fluid flow within pipes
Flow Through Pipe:  the analysis of fluid flow within pipesFlow Through Pipe:  the analysis of fluid flow within pipes
Flow Through Pipe: the analysis of fluid flow within pipes
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 

International Journal of Security, Privacy and Trust Management (IJSPTM)

  • 1. International Journal of Security, Privacy and Trust Management ( IJSPTM ) ISSN 2277 – 5498 [Online]; 2319 – 4103 [Print] http://airccse.org/journal/ijsptm/index.html Call for papers With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks both wired and wireless centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals. Topics of Interest  Trust, Security, Privacy, Policy management  Agent Based Trust Management  Authorization, Authentication and Identity Management  Pervasive Computation Trust  Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust  Decentralized Trust Management  Trust in Service-Oriented Architecture- Open Architecture and Services  Social Networks & Web 2.0 Trust Management  Trust Management system for Wireless, mobile and sensor networks  Policy of Trust in E-leaning systems  Trust/risk based security frameworks  Trust Management for virtual organizations  Trust and Reputation Management  Multimedia Content Management Paper Submission Authors are invited to Submit papers for this journal through the Email: ijsptm@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. For paper format download the template in this page Important Dates  Submission Deadline : June 04, 2024  Notification : July 04, 2024  Final Manuscript Due : July 11, 2024  Publication Date : Determined by the Editor-in-Chief Contact us Here's where you can reach us : ijsptm@aircconline.com or ijsptmjournal@yahoo.com