Focus on Virus
CFP COMCOM, Elsevier: Special Issue on Security and Privacy in Unified Communications: Challenges and Solutions Jul 10 2014 08:54AM
Georgios Karopoulos (georgios karopoulos gmail com)
[Apologies if you receive multiple copies of this message]


*Call for Papers*

Computer Communications Journal, Elsevier
(Current Impact Factor: 1.079)

Special Issue on:
Security and Privacy in Unified Communications: Challenges and Solutions

Direct Link:


Unified Communications (UC) merge different communication
technologies, types of products, and services, from various
manufacturers, operators, and countries, following diverse policies
and standards. Specifically, in the context of UC, a range of
communication tools are integrated in a way that both corporations and
individuals are able to manage all their communications in one entity
instead of doing it disjointly. It is therefore said that UC bridges
the opening between the various computer related communication
technologies and Voice over IP (VoIP). However, this high level of
heterogeneity expands the risks related to security and privacy that
stakeholders should deal with. To eliminate or even prevent the
increasing threats to end-users and operators, it is important to
explore this growing and timely research topic.
This feature topic will benefit the research community towards
identifying challenges and disseminating the latest methodologies and
solutions to UC security and privacy issues. Its objective is to
publish high-quality articles presenting open issues, algorithms,
protocols, policies, frameworks, standards, and solutions for UC
related to security and privacy. Only technical papers describing
previously unpublished, original, state-of-the-art research, and not
currently under review by a conference or a journal will be
considered. Reviews and case studies which address state-of-art
research and state-of-practice industry experiences are also welcomed.
We solicit papers in a variety of topics related to unified
communications security and privacy, including, but not limited to:

- Authorization and access control for UC services
- Denial of service prevention schemes for UC
- Reliability and availability issues on UC
- Penetration testing, intrusion detection and prevention
- End-to-end security solutions
- Cryptographic protocols for UC
- Voice security
- Signaling security and privacy
- Multimedia application security and privacy analysis
- Multimedia communication platforms vulnerabilities and attacks
- Security and privacy in mobile communication services
- Smartphone multimedia apps security and privacy
- Social networking security and privacy
- Testbed and case studies for secure and private UC services
- Trust establishment in UC
- IP Multimedia Subsystem (IMS) security
- Privacy and identity management
- Privacy enhancing technologies for UC
- Privacy models for UC
- Security and privacy assessment for UC
- Security policies
- Auditing, verification, and validation of UC services
- Risk analysis and management
- Cyber-security issues affecting UC
- Protection of UC as a Critical Information Infrastructure
- VoIP peering security issues

All received submissions will be sent out for peer review by at least
two experts in the field and evaluated with respect to relevance to
the special issue, level of innovation, depth of contributions, and
quality of presentation. Guest editors will make an initial
determination of the suitability and scope of all submissions. Papers
that either lack originality, clarity in presentation or fall outside
the scope of the special issue will not be sent for review and the
authors will be promptly informed in such cases. Submitted papers must
not be under consideration by any other journal or publication.


Manuscript submission deadline: October 31, 2014
Pre-notification (first round): January 30, 2015
Final-notification (second round): April 3, 2015
Publication of special issue: 2015 (Tentative)

Submission Details

Authors should follow the instructions available at - kindly click the â??Guide for Authorsâ?
link in the top box on the right side. When submitting the article,
select â??UC Security and Privacyâ? in the â??Select an Article Typeâ? box
in the submission process.

Guest Editors

Georgios Karopoulos
Joint Research Centre (JRC), Italy
e-mail: georgios.karopoulos (at) (dot) eu [email concealed]

Georgios Portokalidis
Stevens Institute of Technology, USA
e-mail: gportoka (at) stevens (dot) edu [email concealed]

Josep Domingo-Ferrer
Universitat Rovira i Virgili, Catalonia
e-mail: josep.domingo (at) urv (dot) cat [email concealed]

Ying-Dar Lin
National Chiao Tung University (NCTU), Taiwan
e-mail: ydlin (at) (dot) tw [email concealed]

Dimitris Geneiatakis
Joint Research Centre (JRC), Italy
e-mail: dimitrios.geneiatakis (at) (dot) eu [email concealed]

Georgios Kambourakis
University of the Aegean, Greece
e-mail: gkamb (at) aegean (dot) gr [email concealed]

This list is sponsored by: Black Hat

Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier
technical event for ICT security experts. Featuring 30 hands-on training
courses and 90 Briefings presentations with lots of new content and new
tools. Network with 4,000 delegates from 70 nations. Visit product
displays by 30 top sponsors in a relaxed setting.

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus