SlideShare a Scribd company logo
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ISSN 2277 – 5498 [Online]; 2319 – 4103 [Print]
http://airccse.org/journal/ijsptm/index.html
Call for papers
With the simplicity of transmission of data over the web increasing, there has more prominent need for
adequate security mechanisms. Trust management is essential to the security framework of any network.
In most traditional networks both wired and wireless centralized entities play pivotal roles in trust
management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open
access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that
needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Topics of Interest
 Trust, Security, Privacy, Policy management
 Agent Based Trust Management
 Authorization, Authentication and Identity Management
 Pervasive Computation Trust
 Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust
 Decentralized Trust Management
 Trust in Service-Oriented Architecture- Open Architecture and Services
 Social Networks & Web 2.0 Trust Management
 Trust Management system for Wireless, mobile and sensor networks
 Policy of Trust in E-leaning systems
 Trust/risk based security frameworks
 Trust Management for virtual organizations
 Trust and Reputation Management
 Multimedia Content Management
Paper Submission
Authors are invited to Submit papers for this journal through the Email: ijsptm@aircconline.com or
through Submission System. Submissions must be original and should not have been published previously
or be under consideration for publication while being evaluated for this Journal. For paper format
download the template in this page.
Important Dates
 Submission Deadline : April 13, 2025
 Notification : May 11, 2025
 Final Manuscript Due : May 18, 2025
 Publication Date : Determined by the Editor-in-Chief
Contact us
Here's where you can reach us : ijsptm@aircconline.com or ijsptmjournal@yahoo.com

More Related Content

PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 

Similar to International Journal of Security, Privacy and Trust Management ( IJSPTM ) (20)

PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
Ad

More from ClaraZara1 (20)

PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
PDF
July 2025 - Top 10 Read Articles in International Journal of Security, Privac...
ClaraZara1
 
PDF
10th International Conference on Networks, Communications, Wireless and Mobil...
ClaraZara1
 
PDF
17th International Conference on Wireless & Mobile Network (WiMo 2025)
ClaraZara1
 
PDF
3rd International Conference on Blockchain and Applications (BLKCA 2025)
ClaraZara1
 
PDF
6th International Conference on Software Engineering, Security and Blockchain...
ClaraZara1
 
PDF
17th International Conference on Network and Communications Security (NCS 2025)
ClaraZara1
 
PDF
Using Lattice To Dynamically Prevent Information Leakage For Web Services
ClaraZara1
 
PDF
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
PDF
Data Privacy and Digital Rights: Protecting Privacy through Law Surveillance ...
ClaraZara1
 
PDF
6th International Conference on Advances in Software Engineering (ASOFT 2025)
ClaraZara1
 
PDF
11th International Conference on Software Engineering (SOENG 2025)
ClaraZara1
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ClaraZara1
 
PDF
Generative AI Ethics: a Comprehensive Safety and Regulation Framework
ClaraZara1
 
PDF
7th International Conference on Internet of Things (CIoT 2025)
ClaraZara1
 
PDF
5th International Conference on Cryptography and Blockchain (CRBL 2025)
ClaraZara1
 
PDF
May 2025 - Top 10 Cited Articles in International Journal of Security, Privac...
ClaraZara1
 
PDF
17th International Conference on Network and Communications Security (NCS 2025)
ClaraZara1
 
PDF
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
ClaraZara1
 
PDF
5th International Conference on Cryptography and Blockchain (CRBL 2025)
ClaraZara1
 
International Journal of Security, Privacy and Trust Management ( IJSPTM )
ClaraZara1
 
July 2025 - Top 10 Read Articles in International Journal of Security, Privac...
ClaraZara1
 
10th International Conference on Networks, Communications, Wireless and Mobil...
ClaraZara1
 
17th International Conference on Wireless & Mobile Network (WiMo 2025)
ClaraZara1
 
3rd International Conference on Blockchain and Applications (BLKCA 2025)
ClaraZara1
 
6th International Conference on Software Engineering, Security and Blockchain...
ClaraZara1
 
17th International Conference on Network and Communications Security (NCS 2025)
ClaraZara1
 
Using Lattice To Dynamically Prevent Information Leakage For Web Services
ClaraZara1
 
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
Data Privacy and Digital Rights: Protecting Privacy through Law Surveillance ...
ClaraZara1
 
6th International Conference on Advances in Software Engineering (ASOFT 2025)
ClaraZara1
 
11th International Conference on Software Engineering (SOENG 2025)
ClaraZara1
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ClaraZara1
 
Generative AI Ethics: a Comprehensive Safety and Regulation Framework
ClaraZara1
 
7th International Conference on Internet of Things (CIoT 2025)
ClaraZara1
 
5th International Conference on Cryptography and Blockchain (CRBL 2025)
ClaraZara1
 
May 2025 - Top 10 Cited Articles in International Journal of Security, Privac...
ClaraZara1
 
17th International Conference on Network and Communications Security (NCS 2025)
ClaraZara1
 
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
ClaraZara1
 
5th International Conference on Cryptography and Blockchain (CRBL 2025)
ClaraZara1
 
Ad

Recently uploaded (20)

PDF
Activated Carbon for Water and Wastewater Treatment_ Integration of Adsorptio...
EmilianoRodriguezTll
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PDF
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
PPTX
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
VinayB68
 
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
sangeethamtech26
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
PDF
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
PDF
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
PDF
Introduction to Data Science: data science process
ShivarkarSandip
 
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
ijcncjournal019
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPTX
Simulation of electric circuit laws using tinkercad.pptx
VidhyaH3
 
PPTX
TE-AI-Unit VI notes using planning model
swatigaikwad6389
 
PPTX
Practice Questions on recent development part 1.pptx
JaspalSingh402
 
PPT
Ppt for engineering students application on field effect
lakshmi.ec
 
PPTX
Edge to Cloud Protocol HTTP WEBSOCKET MQTT-SN MQTT.pptx
dhanashri894551
 
PPT
High Data Link Control Protocol in Data Link Layer
shailajacse
 
PDF
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
VICTOR MAESTRE RAMIREZ
 
Activated Carbon for Water and Wastewater Treatment_ Integration of Adsorptio...
EmilianoRodriguezTll
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
VinayB68
 
Strings in CPP - Strings in C++ are sequences of characters used to store and...
sangeethamtech26
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
Introduction to Data Science: data science process
ShivarkarSandip
 
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
ijcncjournal019
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
Simulation of electric circuit laws using tinkercad.pptx
VidhyaH3
 
TE-AI-Unit VI notes using planning model
swatigaikwad6389
 
Practice Questions on recent development part 1.pptx
JaspalSingh402
 
Ppt for engineering students application on field effect
lakshmi.ec
 
Edge to Cloud Protocol HTTP WEBSOCKET MQTT-SN MQTT.pptx
dhanashri894551
 
High Data Link Control Protocol in Data Link Layer
shailajacse
 
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
VICTOR MAESTRE RAMIREZ
 

International Journal of Security, Privacy and Trust Management ( IJSPTM )

  • 1. International Journal of Security, Privacy and Trust Management ( IJSPTM ) ISSN 2277 – 5498 [Online]; 2319 – 4103 [Print] http://airccse.org/journal/ijsptm/index.html Call for papers With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks both wired and wireless centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals. Topics of Interest  Trust, Security, Privacy, Policy management  Agent Based Trust Management  Authorization, Authentication and Identity Management  Pervasive Computation Trust  Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust  Decentralized Trust Management  Trust in Service-Oriented Architecture- Open Architecture and Services  Social Networks & Web 2.0 Trust Management  Trust Management system for Wireless, mobile and sensor networks  Policy of Trust in E-leaning systems  Trust/risk based security frameworks  Trust Management for virtual organizations  Trust and Reputation Management  Multimedia Content Management Paper Submission Authors are invited to Submit papers for this journal through the Email: [email protected] or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. For paper format download the template in this page. Important Dates  Submission Deadline : April 13, 2025  Notification : May 11, 2025  Final Manuscript Due : May 18, 2025  Publication Date : Determined by the Editor-in-Chief Contact us Here's where you can reach us : [email protected] or [email protected]