z-logo
open-access-imgOpen Access
Call for papers: systematic network optimizations for security parameters (security and communication networks)
Author(s) -
Zhang Hongmei,
Wei Yongzhuang,
Lu Rongxing,
Hu Rose Qingyang
Publication year - 2014
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.933
Subject(s) - computer science , computer security , confidentiality , relevance (law) , network security , field (mathematics) , information security , quality (philosophy) , usability , security service , philosophy , mathematics , epistemology , human–computer interaction , political science , pure mathematics , law
In network planning and design, security usually conflicts with other design objectives, such as usability, performance, and even functionality. Meanwhile, security goals have their own inherent contradictions, as confidentiality, integrity, privacy, accountability, availability, and recovery from safety attacks often conflict fundamentally. For a good network design, balancing these design objectives and cost is the prerequisite. However, it is quite difficult to satisfy all the security requirements simultaneously, let alone themultiple interacting and possibly conflicting targets. Ultimately, security comes down to using the information available best to balance the trade-offs among the competing goals of multiple factors. Considered as one of the grand challenges of the field, study the objective metric to evaluate the trade-offs of network security has draw extensive research attentions recently. In this call for papers, we would like to invite novel ideas; theoretical analysis for evaluating, modeling, and optimizing the trade-offs among network security; and other design objectives. Submissions of applications-oriented papers describing case studies and simulations are encouraged as well. Original papers, as well as expository and survey papers, are sought, both invited and contributed. All manuscripts are subjected to rigorous reviews as per the policy of this journal before they can be accepted for publication. Sample topics include, but are not limited to, the following:

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here