图书馆主页
数据库简介
最新动态
联系我们



返回首页


 刊名字顺( Alphabetical List of Journals):

  A|B|C|D|E|F|G|H|I|J|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z|ALL


  检 索:         高级检索

期刊名称:IEEE SECURITY & PRIVACY

ISSN:1540-7993
出版频率:Bi-monthly
出版社:IEEE COMPUTER SOC, 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, USA, CA, 90720-1314
  出版社网址:http://www.ieee.org
期刊网址:http://www.computer.org/portal/site/security/
影响因子:3.573
主题范畴:COMPUTER SCIENCE, INFORMATION SYSTEMS;    COMPUTER SCIENCE, SOFTWARE ENGINEERING

期刊简介(About the journal)    投稿须知(Instructions to Authors)    编辑部信息(Editorial Board)   



About the journal

Organizations relying on the Internet face significant challenges to ensure that their networks operate safely. And that their systems continue to provide critical services even in the face of attacks.

Denial of service, worms, DNS, and router attacks are increasing. To help you stay one step ahead of these and other threats, the IEEE Computer Society published a new periodical in 2003, IEEE Security & Privacy magazine.

IEEE Security & Privacy will rethink the role and importance of networked infrastructure and help you develop lasting security solutions. Topics covered include:

  • Wireless Security
  • Securing the Enterprise
  • Designing for Security
  • Infrastructure Security
  • Privacy Issues
  • Legal Issues
  • Digital Rights Management
  • Cybercrime
  • Intellectual Property Protection, and Piracy
  • The Security Profession
  • Education

The primary objective of IEEE Security & Privacy is to stimulate and track advances in information assurance and security and present these advances in a form that can be useful to a broad cross-section of the professional community-ranging from academic researchers to industry practitioners. It is intended to serve a broad readership.

IEEE Security & Privacy provides a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of information assurance such as legal and ethical issues, privacy concerns, tools to help secure information, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology.

S&P accepts commercial and classified advertisements.


Instructions to Authors

Scope

The primary objective of IEEE Security & Privacy is to stimulate and track advances in information assurance and security and present these advances in a form that can be useful to a broad cross-section of the professional community-ranging from academic researchers to industry practitioners. It is intended to serve a broad readership.

IEEE Security & Privacy is envisioned to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of information assurance such as legal and ethical issues, privacy concerns, tools to help secure information, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology.

How to Submit a Manuscript

The IEEE Computer Society now employs a secure, Web-based manuscript submission and peer-reivew tracking system. Authors must use Manuscript Central to upload their submissions. First-time users must create a new account.

Please see our submission guidelines and requirements located in the Author Center .

For general questions on using Manuscript Central, see our FAQ page.

If you are familiar with the manuscript process and wish to bypass the guidelines, please click the "Submit" button.


Editorial Board

Editor in chief
George Cybenko is the Dorothy and Walter Gramm Professor of Engineering at Dartmouth College, Hanover, New Hampshire. He was the founding editor in chief of Computing in Science and Engineering , published jointly by the IEEE Computer Society and the American Institute of Physics. His research interests are in signal processing, distributed information systems and computer security. He has a BS in math from the University of Toronto and a PhD in electrical engineering and computer science from Princeton University. He is a member of SIAM, an IEEE Fellow, and a member of the Computer Society's Board of Governors.
Associate Editors in Chief
Marc Donner is an executive director in the Institutional Securities division of Morgan Stanley where he focuses on system and data architecture around client relationships. His recent projects have included initiating Morgan Stanley's Internet presence and intranet activities and modernizing a number of legacy systems.  He received a BS in Electrical Engineering from Caltech and a PhD in Computer Science from Carnegie Mellon University. He is a member of the IEEE Computer Society and Usenix.
Carl E. Landwehr is a Senior Research Scientist at the University of Maryland’s Institute for Systems Research in College Park, Md. His research interests include all aspects of computer security and information assurance. Landwehr has a PhD in Computer and Communication Sciences from the University of Michigan. He is a senior member of the IEEE and is a member of the ACM, Sigma Xi, and Tau Beta Pi.

Fred B. Schneider is a professor at Cornell's Computer Science Department, director of the AFRL/Cornell Information Assurance Instutute, and the founding chief scientist for New York State's Griffiss Institute for Cybersecurity. Schneider has an M.S. and Ph.D. from SUNY Stony Brook and a B.S. from Cornell. Dr. Schneider is author of the graduate text "On Concurrent Programming" and co-author (with David Gries) of the undergraduate text "A Logical Approach to Discrete Math". He is a fellow of AAAS and ACM, is Professor at Large at University of Tromso (Norway), and received an honorary Doctor of Science from University of NewCastle-upon-Tyne. In addition to chairing the National Research Council's study committee on information systems trustworthiness and editing "Trust in Cyberspace", Schneider is co-managing editor of Springer-Verlag's Texts and Monographs in Computer Science, and serves on a number of journal editorial boards.

back to top
 
Editorial Board
Martin Abadi is a professor of computer science at the University of California, Santa Cruz (since 2001), and a senior researcher at Microsoft (since 2006). Earlier, he studied at Stanford University and worked at Digital's System Research Center and other industrial labs. His research is on computer and network security, programming languages, and specification and verification methods. He has contributed to the design and analysis of security protocols, to the foundations of object-oriented languages, and to temporal-logic verification techniques.
Massoud Amin is area manager, Infrastructure Security, and serves as lead, Mathematics and Information Science at the Electric Power Research Institute (EPRI). At EPRI, he leads strategic research in modeling, simulation, optimization, and adaptive control of complex interactive networks, including national infrastructures for energy, telecommunication, transportation, and finance. He has BS and MS degrees in electrical and computer engineering from the University of Massachusetts-Amherst, and MS and DSc degrees in systems science and mathematics from Washington University. He is a member of the Board on Infrastructure and the Constructed Environment (BICE) at the US National Academy of Engineering, Sigma Xi, Tau Beta Pi, Eta Kappa Nu, AAAS, AIAA, ASME, IEEE (senior member), NY Academy of Sciences, SIAM, and Informs.

Elisa Bertino is professor of computer science and the chair of the Department of Computer Science and Communication of the University of Milan. Her main research interests are in the areas of security, database systems, and object-oriented technology. She serves on the editorial boards of several scientific journals, including IEEE Internet Computing and the ACM Transactions on Information and Systems Security. She is a member of the ACM and an IEEE Fellow.

Robert K. Cunningham is the associate leader of the Information Systems Technology Group at MIT Lincoln Laboratory. He studies intrusion detection systems that do not require advance knowledge of the method of attack, malicious code detection, and analysis of malicious software. He is particularly interested in evaluation of systems that perform security-related tasks. He has an ScB in computer engineering from Brown University, an MS in electrical engineering and a PhD in cognitive and neural systems from Boston University. He is a member of Sigma Xi and a senior member of the IEEE.

Dorothy E. Denning is a professor in the Department of Defense Analysis at the Naval Postgraduate School. Her current work encompasses the areas of trust and influence, conflict and cyberspace, terrorism and crime, information warfare and security, and cryptography. She is an ACM Fellow and recipient of the Augusta Ada Lovelace Award. She received BA and MA degrees in mathematics from the University of Michigan and PhD degree in computer science from Purdue University.

John S. Erickson is a principal scientist with the Digital Media Systems Program of Hewlett-Packard Laboratories. His research focuses on areas related to policy expression and management and enforce­ment in digital object repositories. He holds a PhD in Engineering Sciences from Dartmouth College, an M.Eng.(EE) from Cornell University, and a BSEE from Rensselaer Polytechnic Institute.

Tiffany M. Frazier is the director of the Advanced Computing group at Alphatech. Her research interests include autonomic computing, intrusion detection and response, information operations, and real-time sys­tems. She received her BS in computer science from the University of Wisconsin at Madison and a MS and PhD in Computer Science from UCLA. She is a member of the ACM and IEEE Computer and Control Systems Societies.

Anup K. Ghosh is a research professor and chief scientist at the Center for Secure Information Systems at George Mason University. Earlier, he was a program manager in the Advanced Technology Office of the Defense Advanced Research Projects Agency. He leads research in e-commerce security, intrusion detection, software certification, robustness testing, and malicious software detection. He wrote E-Commerce Security: Weak Links, Best Defenses (Wiley, 1998). The book leverages his research in computer security, as well as practical experience gained through security consulting with Fortune 50 companies to assess the security of e-commerce systems and smart card protocols.

Dieter Gollmann holds a Professorship at the Technical University of Hamburg-Harburg. He has a Dipl.-Ing. in Engineering Mathematics and Dr.techn. from the University of Linz, Austria. He is the author of Computer Security (John Wiley & Sons, 1999). He is a member of the IEEE, the IACR, and ACM.

Jim Hearn taught a course in Information systems and has consulted for two small companies since retiring five years ago from a thirty-five career with the National Security Agency. As Deputy Director, NSA, for Information Systems Security, he developed a deep appreciation for the importance of protecting the nation's information infrastructure and for the difficulty of this challenge. He is associated with the Cyber Corps Program and occasionally reviews papers for Harvard University's Program on Information Resources Policy.

Charles J. Holland is the US deputy undersecretary of defense for science and technology, where he is responsible for defense science and technology strategic planning, budget allocation, and program review and execution. He is the principal US representative to the Technical Cooperation Program between Australia, Canada, New Zealand, the UK, and the US, and is also responsible for the DoD High Performance Computing Modernization Program, the Defense Modeling and Simulation Office, and management oversight of the Software Engineering Institute. He received a BS and MS in applied mathematics from the Georgia Institute of Technology and a PhD in applied mathematics from Brown University.

David Ladd is the senior manager of External Security Research Programs at Microsoft Research. As part of the University Relations Group, he is involved in efforts to create joint research opportunities at top universities in North America, with particular emphasis on mobile code security, software testing, mobile and wireless security, information assurance education, human factors in software engineering, and computer forensics. He received his BS and MBA from Oregon State University and is a member of the IEEE, ACM and Usenix.

Susan Landau is a Distinguished Engineer at Sun Microsystems Laboratories, where she concentrates on the interplay between security and public policy. Before joining Sun, Landau was a faculty member at the University of Massachusetts and Wesleyan University. She and Whitfield Diffie have written Privacy on the Line: The Politics of Wiretapping and Encryption. She is a member of the National Institute of Standards and Technology's Information Security and Privacy Advisory Board and she moderates the "researcHers" list, an international mailing list for women computer science researchers.

Nancy R. Mead is a senior member of the technical staff in the Networked Systems Survivability Program at the Software Engineering Institute (SEI). The CERT?Coordination Center is a part of this program. Mead is also a faculty member in the Master of Software Engineering and Master of Information Systems Management programs at Carnegie Mellon University. Her research interests are in the areas of software requirements engineering, software architectures, and software metrics. Mead has more than 100 publications and invited presentations. She is a senior member of the Institute of Electrical and Electronic Engineers, Inc. (IEEE) and the IEEE Computer Society and is also a member of the Association for Computing Machinery (ACM). Dr. Mead has a PhD in mathematics from the Polytechnic Institute of New York, and has a BA and an MS in mathematics from New York University.

Peter G. Neumann is SRI Computer Science Lab’s principal scientist. He previously worked at Bell Labs and was heavily involved in Multics development jointly with MIT and Honeywell. He moderates the ACM Risks Forum, edits Communications of the ACM’s monthly Inside Risks column, chairs the ACM Committee on Computers and Public Policy, cochairs the ACM Advisory Committee on Security and Privacy, cofounded People For Internet Responsibility (PFIR), and cofounded the Union for Representative International Internet Cooperation and Analysis (URIICA). His book, Computer-Related Risks, is in its fifth printing. He has doctorates from Harvard and Darmstadt. He is a Fellow of the ACM, IEEE, and AAAS, and is also an SRI Fellow. He is the 2002 recipient of the National Computer System Security Award.

E. Michael Power (Gowling Lafleur Henderson LLP)

Ira Rubinstein (Microsoft)

Avi Rubin is an associate professor of computer science and technical director of Johns Hopkins University Information Security Institute. His research interests include systems and networking security and privacy implication of security solutions. He is author of several books including Firewalls and Internet Security, 2nd ed. with Bill Cheswick and Steve Bellovin (Addison Wesley, 2003). He received his BS in computer science and MS and PhD in computer science and engineering from the University of Michigan, Ann Arbor.

William H. Sanders is a Donald Biggar Willett Professor of Engineering and the Director of the Information Trust Institute at the University of Illinois. He is a professor in the Department of Electrical and Computer Engineering and the Coordinated Science Laboratory. He is a Fellow of the IEEE and the ACM. He is serving as the Vice-Chair of IFIP Working Group 10.4 on Dependable Computing. In addition, he serves on the editorial boards of and is the Area Editor for Simulation and Modeling of Computer Systems for the ACM Transactions on Modeling and Computer Simulation. He is a past Chair of the IEEE Technical Committee on Fault-Tolerant Computing.

Sal Stolfo (Columbia University)

Francis Sullivan is the former editor in chief of Computing in Science & Engineering magazine and director of the Institute for Defense Analyses' Center for Computing Sciences. His research interests center on computational physics, including early efforts for vectorizing molecular dynamics algorithms and later work on symbolic dynamics, generation of random surface, and, most recently, determination of a dimer-covering constant in 3D. He has a BS in physics from Pennsylvania State University and a PhD in mathematics from the University of Pittsburgh. He is past chairman of the IMA Board of Governors and a member of the SIAM Board of Trustees.

Giovanni Vigna is an Assistant Professor in the Department of Computer Science at the University of California in Santa Barbara. His current research interests include network and computer security, intrusion detection systems, security of mobile code systems, penetration testing, and distributed systems. He has published a number of publications on intrusion detection and security. He received his MS and PhD from Politecnico di Milano, Italy. He is a member of IEEE and ACM.

back to top
 
Department Editors
Attack Trends and Malware Recon
Iván Arce is chief technology officer and cofounder of Core Security Technologies, an information security company based in Boston. Previously, he worked as vice president of research and development for a computer telephony integration company and as information security consultant and software developer for various government agencies and financial and telecommunications companies.

Elias Levy is an architect with Symantec. His research interests include buffer overflows and networking protocol vulnerabilities. He is also a frequent commentator on computer security issues and participates as a technical advisor to a number of security related companies.

Basic Training
James A. Whittaker

Michael Howard

Biblio Tech
Marc Donner (see Associate Editors in Chief)

Book Reviews
Charles Pfleeger

Shari Lawrence Pfleeger is a senior researcher at RAND's Arlington, Virginia office where she helps organizations and government agencies understand whether and how information technology supports their mission and goals. She has a BA in mathematics from Harpur College in Binghamton, New York, an MA in mathematics from The Pennsylvania State University, an MS in Planning from The Pennsylvania State University, and a PhD in information technology and engineering from George Mason University. She was the associate editor-in-chief of IEEE Software, where she edited the Quality Time column, and then associate editor of IEEE Transactions on Software Engineering . From 1998 to 2002, she was a member of the editorial board of Prentice Hall's Software Quality Institute series. She is a senior member of IEEE, the IEEE Computer Society, and the ACM.

Martin R. Stytz is a senior principal research scientist and engineer at the Air Force Research Laboratory. He received a PhD in computer science and engineering from the University of Michigan. He is a member of the ACM, the IEEE, the IEEE Computer Society, the AAAI, and the Society for Computer Simulation.

Building Security In
Gary McGraw is currently CTO at Cigital. He has a dual PhD in cognitive science and computer science from Indiana University. He writes a monthly software security column for Software Development magazine and serves on several corporate advisory boards.

Conference Reports
Carl E. Landwehr (see Associate Editors in Chief)

Crypto Corner
Peter Gutmann is a researcher in the Department of Computer Science at the University of Auckland working on design and analysis of cryptographic security architectures. He helped write the popular PGP encryption package, has authored a number of papers and RFC's on security and encryption including the X.509 Style Guide for certificates, and is the author of "Cryptographic Security Architecture: Design and Verification" and the open source cryptlib security toolkit.

David Naccache manages Gemplus' Applied Research & Security Centre. He holds 59 patent families and has served in more than 40 programme committees, all in cryptography and security. He served as a security expert for European Telecommunications Standards Institute, is a Probationary Forensic Scientist by the Court of Appeal Paris and currently holds professorships at Royal Holloway University of London New Bedford College, Beijing JiaoTong University, P.R.C and University College London. David is also a locum tenens lecturer at the Universit?Paris II (Panthéon Assas). He is an editorial board member of IT Professional and ACM TISSEC and an active white-hat firmware hacker.

Charles C. Palmer manages the Security, Privacy, and Cryptography department at IBM’s Thomas J. Watson Research Center. His teams work in the areas of cryptography research, Internet security technologies, Java security, secure embedded systems, smart cards, secure signed documents, and the global security analysis lab, which he cofounded in 1995. He previously was an adjunct professor of computer science at Polytechnic University, New York. Although his primary focus is now security, Palmer remains active in the Genetic Algorithms community by participating in program committees for the various conferences since 1994. He has a Ph.D. in Computer Science, Polytechnic University, Brooklyn, NY, M.S. in Computer Science, Tulane University, New Orleans, LA, 1984, and BS in Computer Science from Oklahoma State University. He is a member of ACM, the IEEE, and the IEEE Computer Society.

Digital Protection
Michael Lesk works at the Internet Archive. He received a PhD from Harvard in chemical physics. His research interests include digital libraries, networking, and Unix software. Lesk is author of Practical Digital Libraries (Morgan Kaufman, 1997). He is a fellow of the ACM and a member of the IEEE and the American Society for Information Science and Technology (ASIS&T).

Martin R. Stytz (see Book Reviews department )

Roland L. Trope is a partner in the law firm of Trope and Schramm LLP and an adjunct professor in the Department of Law, United States Military Academy, West Point. His research interests are cyberlaw, cross-border transactions, defense procurements, export controls, intellectual property, privacy, and information security management. Trope has a BA in political science from the University of Southern California, a BA and an MA in English language and literature from Oxford University, and a JD from the Yale Law School. He is a member of the American Bar Association’s Cyberspace Law Committee and the Association of the Bar of the City of New York’s Information Technology Committee and coauthor of the treatise Checkpoints in Cyberspace (to be published by the ABA in Mar. 2005).

Education
Matt Bishop is an assistant professor of computer science at the Department of Computer Science at the University of California at Davis. His main research area is the analysis of vulnerabilities in computer systems, including modeling them, building tools to detect vulnerabilities, and ameliorating or eliminating them. He received an AB in astronomy and applied mathematics and an MA in mathematics, from the University of California at Berkeley; and an MS and PhD in computer science from Purdue University. He is a charter member of the National Colloquium on Information Systems Security Education, and led a project to gather and make available many unpublished seminal works in computer security.

Deb Frincke is an associate professor in the computer science department at the University of Idaho. Frincke is also the cofounder and codirector of the Center for Secure and Dependable Software. Her current research focuses on computer security with an emphasis on intrusion detection and management.

On the Horizon
O. Sami Saydjari is CEO of Cyber Defense Agency, LLC, an information-assurance research and development lab and consulting firm. He is also the president of the Professionals for Cyber Defense, a nonprofit group of information-assurance leaders dedicated to helping the US government adopt sound cyberdefense policy.

Secure Systems
S.W. Smith is currently an assistant professor of computer science at Dartmouth College. He was educated at Princeton and CMU, and is a member of the ACM, USENIX, the IEEE Computer Society, Phi Beta Kappa, and Sigma Xi.

back to top
 
Columnists
Clear Text
Bruce Schneier is the chief technology officer of Counterpane Internet Security, the world leader in Managed Security Monitoring. Counterpane provides security monitoring services to Fortune 2000 companies worldwide. He is the author of six books on security and cryptography, including the security best seller, Secrets & Lies: Digital Security in a Networked World. His first book, Applied Cryptography , has sold over 150,000 copies and is the definitive work in the field. He designed the Blowfish and Twofish encryption algorithms, and writes the Crypto-Gram monthly newsletter.

Steve Bellovin

Daniel Geer Jr. is vice president and chief scientist at Verdasys. He’s a stiff-necked, moralistic, noncompromising SOB, a frustrated academic from a long line of preachers. His one true love is to make the complex simple—yet not simplistic—to practice lossless compression of that tangled blather that passes for erudition, much less punditry.
 



 返回页首 


邮编:430072   地址:中国武汉珞珈山   电话:027-87682740   管理员Email:
Copyright © 2005-2006 武汉大学图书馆版权所有