SlideShare a Scribd company logo
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ISSN 2277 – 5498 [Online]; 2319 – 4103 [Print]
http://airccse.org/journal/ijsptm/index.html
Call for papers
With the simplicity of transmission of data over the web increasing, there has more prominent need for
adequate security mechanisms. Trust management is essential to the security framework of any network.
In most traditional networks both wired and wireless centralized entities play pivotal roles in trust
management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open
access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that
needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Topics of Interest
 Trust, Security, Privacy, Policy management
 Agent Based Trust Management
 Authorization, Authentication and Identity Management
 Pervasive Computation Trust
 Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust
 Decentralized Trust Management
 Trust in Service-Oriented Architecture- Open Architecture and Services
 Social Networks & Web 2.0 Trust Management
 Trust Management system for Wireless, mobile and sensor networks
 Policy of Trust in E-leaning systems
 Trust/risk based security frameworks
 Trust Management for virtual organizations
 Trust and Reputation Management
 Multimedia Content Management
Paper Submission
Authors are invited to Submit papers for this journal through the Email: ijsptm@aircconline.com or
through Submission System. Submissions must be original and should not have been published previously
or be under consideration for publication while being evaluated for this Journal. For paper format
download the template in this page
Important Dates
 Submission Deadline : May 25, 2024
 Notification : June 20, 2024
 Final Manuscript Due : June 27, 2024
 Publication Date : Determined by the Editor-in-Chief
Contact us
Here's where you can reach us : ijsptm@aircconline.com or ijsptmjournal@yahoo.com

More Related Content

Similar to International Journal of Security, Privacy and Trust Management (IJSPTM)

Similar to International Journal of Security, Privacy and Trust Management (IJSPTM) (20)

Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
 

More from ClaraZara1

More from ClaraZara1 (20)

10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
 
8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)
 
10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...
 
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond HillDOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)
 
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
 
An Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn ModelAn Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn Model
 
10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...
 
Using Lattice To Dynamically Prevent Information Leakage For Web Services
Using Lattice To Dynamically Prevent Information Leakage For Web ServicesUsing Lattice To Dynamically Prevent Information Leakage For Web Services
Using Lattice To Dynamically Prevent Information Leakage For Web Services
 
10th International Conference on Software Engineering (SEC 2024)
10th International Conference on Software Engineering (SEC 2024)10th International Conference on Software Engineering (SEC 2024)
10th International Conference on Software Engineering (SEC 2024)
 
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
 

Recently uploaded

Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
Kamal Acharya
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 

Recently uploaded (20)

Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdf
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptx
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 

International Journal of Security, Privacy and Trust Management (IJSPTM)

  • 1. International Journal of Security, Privacy and Trust Management ( IJSPTM ) ISSN 2277 – 5498 [Online]; 2319 – 4103 [Print] http://airccse.org/journal/ijsptm/index.html Call for papers With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks both wired and wireless centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals. Topics of Interest  Trust, Security, Privacy, Policy management  Agent Based Trust Management  Authorization, Authentication and Identity Management  Pervasive Computation Trust  Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust  Decentralized Trust Management  Trust in Service-Oriented Architecture- Open Architecture and Services  Social Networks & Web 2.0 Trust Management  Trust Management system for Wireless, mobile and sensor networks  Policy of Trust in E-leaning systems  Trust/risk based security frameworks  Trust Management for virtual organizations  Trust and Reputation Management  Multimedia Content Management Paper Submission Authors are invited to Submit papers for this journal through the Email: ijsptm@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. For paper format download the template in this page Important Dates  Submission Deadline : May 25, 2024  Notification : June 20, 2024  Final Manuscript Due : June 27, 2024  Publication Date : Determined by the Editor-in-Chief Contact us Here's where you can reach us : ijsptm@aircconline.com or ijsptmjournal@yahoo.com