当前位置: X-MOL首页SCI期刊查询及投稿分析系统 › ACM Transactions on Privacy and Security杂志
ACM Transactions on Privacy and Security
基本信息
期刊名称 ACM Transactions on Privacy and Security
ACM T PRIV SECUR
期刊ISSN 2471-2566
期刊官方网站 https://tops.acm.org/
是否OA No
出版商 Association for Computing Machinery (ACM)
出版周期
文章处理费 登录后查看
始发年份
年文章数 51
影响因子 3.0(2023)  scijournal影响因子  greensci影响因子
中科院SCI期刊分区
大类学科 小类学科 Top 综述
工程技术3区 COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统3区
CiteScore
CiteScore排名 CiteScore SJR SNIP
学科 排名 百分位 5.2 0.794 1.178
Computer Science
General Computer Science
61/232 73%
Engineering
Safety, Risk, Reliability and Quality
59/207 71%
补充信息
自引率 3.3%
H-index 1
SCI收录状况 Science Citation Index Expanded
官方审稿时间 登录后查看
网友分享审稿时间 数据统计中,敬请期待。
接受率 登录后查看
PubMed Central (PMC) http://www.ncbi.nlm.nih.gov/nlmcatalog?term=2471-2566%5BISSN%5D
投稿指南
期刊投稿网址 https://mc.manuscriptcentral.com/tops
收稿范围
ACM Transactions on Transactions on Privacy and Security (TOPS) is devoted to the study, analysis, and application of information security and privacy.  The journal takes a wide view of this topic and its mission is to publish the best original research in this area.

Relevant topics of interest include:
Security Technologies: authentication; authorization models and mechanisms; auditing and intrusion detection; cryptographic algorithms, protocols, services, and infrastructure; recovery and survivable operation; risk analysis; assurance including cryptanalysis and formal methods; penetration technologies including viruses, Trojan horses, spoofing, sniffing, cracking, and covert channels.

Fundamentals: theory of security and privacy; models of trust; methods for quantifying the risk of the disclosure of private information or the risk a system will be compromised; mechanisms and algorithms that have wide application, including privacy models (e.g. k-anonymity based models and knowledge hiding models), and methods of secure communication with various properties (e.g. non-repudiation or forward secrecy).    

Secure Systems: secure operating systems, database systems and networks; secure distributed systems including security middleware; secure web browsers, servers, and mobile code; specialized secure systems for specific application areas; interoperability, and composition.

Privacy Methods:  methods to offer location privacy; anonymization techniques for users and their data; statistical disclosure control techniques; private information retrieval; protocols for secure multiparty communications, protecting confidential consumer data, and the like. 

Security and Privacy Applications: threats, system tradeoffs, and unique needs of applications; representative application areas include information systems, workflows, cloud computing, cyber-physical systems, electronic commerce, electronic cash, electronic voting, copyright and intellectual property protection, telecommunications systems, wireless systems, and health care.  Design of security and privacy (user experience and usability).

Privacy and Security Policies: confidentiality, integrity, availability, privacy, usage, and survivability policies; tradeoffs, conflicts and synergy among security and privacy objectives.
收录体裁
投稿指南
投稿模板
参考文献格式
编辑信息

                                
我要分享  (欢迎您来完善期刊的资料,分享您的实际投稿经验)
研究领域:
投稿录用情况: 审稿时间:  个月返回审稿结果
本次投稿点评:
提交
down
wechat
bug