当前位置: X-MOL首页 › SCI期刊查询及投稿分析系统 › ACM Transactions on Privacy and Security杂志
ACM Transactions on Privacy and Security
基本信息
期刊名称 | ACM Transactions on Privacy and Security ACM T PRIV SECUR |
---|---|
期刊ISSN | 2471-2566 |
期刊官方网站 | https://tops.acm.org/ |
是否OA | No |
出版商 | Association for Computing Machinery (ACM) |
出版周期 | |
文章处理费 | 登录后查看 |
始发年份 | |
年文章数 | 51 |
影响因子 | 3.0(2023) scijournal影响因子 greensci影响因子 |
中科院SCI期刊分区
大类学科 | 小类学科 | Top | 综述 |
---|---|---|---|
工程技术3区 | COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统3区 | 否 | 否 |
CiteScore
CiteScore排名 | CiteScore | SJR | SNIP | ||
---|---|---|---|---|---|
学科 | 排名 | 百分位 | 5.2 | 0.794 | 1.178 |
Computer Science General Computer Science |
61/232 | 73% |
|||
Engineering Safety, Risk, Reliability and Quality |
59/207 | 71% |
补充信息
自引率 | 3.3% |
---|---|
H-index | 1 |
SCI收录状况 |
Science Citation Index Expanded |
官方审稿时间 | 登录后查看 |
网友分享审稿时间 | 数据统计中,敬请期待。 |
接受率 | 登录后查看 |
PubMed Central (PMC) | http://www.ncbi.nlm.nih.gov/nlmcatalog?term=2471-2566%5BISSN%5D |
投稿指南
期刊投稿网址 | https://mc.manuscriptcentral.com/tops |
---|---|
收稿范围 | ACM Transactions on Transactions on Privacy and Security (TOPS) is devoted to the study, analysis, and application of information security and privacy. The journal takes a wide view of this topic and its mission is to publish the best original research in this area. Relevant topics of interest include: Security Technologies: authentication; authorization models and mechanisms; auditing and intrusion detection; cryptographic algorithms, protocols, services, and infrastructure; recovery and survivable operation; risk analysis; assurance including cryptanalysis and formal methods; penetration technologies including viruses, Trojan horses, spoofing, sniffing, cracking, and covert channels. Fundamentals: theory of security and privacy; models of trust; methods for quantifying the risk of the disclosure of private information or the risk a system will be compromised; mechanisms and algorithms that have wide application, including privacy models (e.g. k-anonymity based models and knowledge hiding models), and methods of secure communication with various properties (e.g. non-repudiation or forward secrecy). Secure Systems: secure operating systems, database systems and networks; secure distributed systems including security middleware; secure web browsers, servers, and mobile code; specialized secure systems for specific application areas; interoperability, and composition. Privacy Methods: methods to offer location privacy; anonymization techniques for users and their data; statistical disclosure control techniques; private information retrieval; protocols for secure multiparty communications, protecting confidential consumer data, and the like. Security and Privacy Applications: threats, system tradeoffs, and unique needs of applications; representative application areas include information systems, workflows, cloud computing, cyber-physical systems, electronic commerce, electronic cash, electronic voting, copyright and intellectual property protection, telecommunications systems, wireless systems, and health care. Design of security and privacy (user experience and usability). Privacy and Security Policies: confidentiality, integrity, availability, privacy, usage, and survivability policies; tradeoffs, conflicts and synergy among security and privacy objectives. |
收录体裁 | |
投稿指南 | |
投稿模板 | |
参考文献格式 | |
编辑信息 |
我要分享 (欢迎您来完善期刊的资料,分享您的实际投稿经验)