Calls for papers
International Journal of Computational Science and Engineering
Special Issue on: "Future Trends in Security Issues in Internet and Web Applications"
Dr. Al-Sakib Khan Pathan, International Islamic University Malaysia
Dr. Muhammad Mostafa Monowar, University of Chittagong, Bangladesh
Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was anticipated few years ago. Today, billions of transactions are done online with the aid of different Web applications. Goods and products are advertised through the Internet, prices go up and down based on online bidding, products are sold and bought online, news and information sharing via Internet even influences the political situation of a country. To formally define Internet and Web, we may say that the Internet is a huge network of networks, a complete networking infrastructure that connects millions of computers together which could be located in different geographic locations. The World Wide Web (WWW), or simply Web on the other hand, is a way of accessing information over the medium of the Internet. So, Internet is the implemented network infrastructure, Web is more like an information sharing model.
Nowadays, almost everyone in touch with ‘computer technology’ is somehow connected with Internet. Even though parts of the world are till today out of proper Internet infrastructure, the existing number of users is huge who use different types of Web applications for their intended tasks. To serve this huge number of users, great volumes of data are stored in Web application databases in different parts of the globe. From time to time, the users need to interact with the backend databases via the user interfaces for various tasks such as: updating data, making queries, extracting data, and so forth. For all these operations, design interface and structure play a crucial role, the quality of which has a great impact on the security of the stored data in the database. The reality is that in many cases many of these applications lack proper level of security or sometimes the security is weak, which makes them vulnerable to get compromised and allows illegitimate users to get access to the backend databases.
A less secure Web application design may allow crafted injection and malicious update on the backend database. This trend can cause lots of damage and theft of trusted users’ sensitive data by unauthorized users. In the worst case, the attacker may gain full control over the Web application and totally destroy or damage the system. Other than this particular scenario, there are numerous forms of attacks which exploit other types of vulnerabilities.
The objective of this special issue is to put together the achievements, present research trends, and future potentials of dealing with various security issues of the Internet and Web applications. We mainly welcome technical papers; however comprehensive survey on specific topic may also be considered (although not encouraged).Subject Coverage
Any related topic will be considered; and indicative list includes:
- Security in Internet protocols: routing, naming, network management
- Security of Web-based applications
- Combating malware: detection, analysis, and prevention
- Security for future home networks, Internet of Things, body-area networks
- Intrusion detection and prevention
- Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
- Privacy technologies
- Theory and practice of network security policies
- Intellectual property protection
- Watermarking and digital rights management
- Security for collaborative applications: teleconferencing and video-conferencing
- Authentication and access control
- Cloud security
- SQL Injection
- Security in next generation and emerging Web applications
Notes for Prospective Authors
Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper was not originally copyrighted and if it has been completely re-written).
All papers are refereed through a peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines page
Manuscript due date: February 15, 2012 (extended)
First round notification: March 15, 2012
Revised paper due: April 15, 2012
Notification of acceptance: May 01, 2012
Submission of final manuscript: May 20, 2012