SCN:SI-SINConf

''Information systems range from those deployed on home computers to state, governmental, and huge enterprise systems using computers connected with local and global networks using wired and wireless channels of information exchange. In order for the users to have high confidence in those systems for the protection and authentication of stored and/or transmitted data, cryptographic solutions have often been provided. It is essential for such solutions to be designed and implemented using sound engineering approaches and practices as part of the core functionality of secure information systems. The effective design and engineering of cryptographic solutions require the understanding of, the requirements of the applications at hand, their constraints and performance characteristics, the capabilities of the hardware and software platforms, the nature of the network environments, and whether off the shelf solutions are feasible, while balancing the desired level of security versus financial costs and risks involved in deploying particular solutions.''

Topics
This special issue will focus on the effective design and engineering (including validation) of cryptographic solutions in secure information systems as they are applied to address topics such as: •	access control and intrusion detection, •	authentication and authorization, •	network security •	security protocols, models and policies, •	information assurance, •	security tools and development platforms, •	trust and privacy, standards, guidelines and certification, •	copyright protection, •	key management and auditing, •	computer forensics, •	risk assessment, •	secure electronic commerce, •	biometric and identity management.

Submissions
This special issue is open to original, high quality contributions that are not published or currently under review by other journals or peer-reviewed conferences. Previously published conference papers must be substantially revised, improved, and extended from their earlier versions with at least 30% new materials or results to comply with the copyright regulations. For manuscript submission, the prospective authors should follow the guidelines available from http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122. Papers should be submitted online at http://mc.manuscriptcentral.com/scn. When submitting the papers, the authors should choose the “Manuscript Type” as “Special Issue”, enter the “Running Head” as “SCN-SI-XXX” and the “Special Issue Title” as “Cryptographic Solutions for Secure Information Systems”, respectively. Each submission will be reviewed by at least three reviewers before a recommendation will be made. Contributing authors might also be asked to review some of the papers submitted to this special issue.

Important Dates
Manuscripts Due: March 31, 2011. First Acceptance Notification: June 15, 2011. Revised Manuscripts Due: July 31, 2011. Final Acceptance Notification: August 15, 2011. Camera-Ready Final Manuscript Due: August 31, 2011. Publication Date: late 2011 / early 2012 (depending on publisher schedules).

Committees

 * Guest Editors:
 * has program chair::Atilla Elçi, Toros University, Mersin, Turkey
 * has program chair::Josef Pieprzyk, Macquarie University, Sydney, Australia
 * has program chair::Mehmet A. Orgun, Macquarie University, Sydney, Australia
 * has program chair::Alexander G. Chefranov, Eastern Mediterranean University, Famagusta, North Cyprus