Generated by Llama 3.3-70B| ACM Transactions on Information and System Security | |
|---|---|
| Title | ACM Transactions on Information and System Security |
| Abbreviation | TISSEC |
| Discipline | Computer security, Information security |
| Language | English |
| Editor | Adrian Perrig |
| Publisher | Association for Computing Machinery |
| Country | United States |
| Publication date | 1998 |
| Impact factor | 2.073 |
ACM Transactions on Information and System Security is a peer-reviewed academic journal published by the Association for Computing Machinery (ACM), focusing on computer security and information security research, with contributions from renowned experts like Whitfield Diffie, Martin Hellman, and Ron Rivest. The journal is also associated with prominent conferences such as ACM Conference on Computer and Communications Security and IEEE Symposium on Security and Privacy. As a leading publication in the field, it has been cited by influential researchers like Bruce Schneier, Niels Ferguson, and Ross Anderson. The journal's editorial board comprises distinguished scholars from institutions like Carnegie Mellon University, Stanford University, and Massachusetts Institute of Technology.
The journal's primary objective is to disseminate innovative research on computer security, cryptography, and information assurance, with a focus on theoretical foundations, practical applications, and cybersecurity policy, as discussed by experts like Vint Cerf, Bob Kahn, and Larry Peterson. The publication features articles on various topics, including access control, authentication, intrusion detection, and secure communication protocols, which are essential for securing Internet of Things (IoT) devices, cloud computing infrastructure, and artificial intelligence systems, as highlighted by researchers like Fei-Fei Li, Yann LeCun, and Geoffrey Hinton. The journal's content is relevant to professionals and researchers working in cybersecurity, information technology, and computer science, including those affiliated with organizations like National Security Agency (NSA), National Institute of Standards and Technology (NIST), and European Union Agency for Network and Information Security (ENISA).
The journal was established in 1998, with its first issue published in November of that year, under the guidance of founding editors like Fred B. Schneider and Edward W. Felten. Since its inception, the publication has been associated with prominent researchers and institutions, including University of California, Berkeley, University of Cambridge, and Georgia Institute of Technology. Over the years, the journal has published seminal papers on public-key cryptography, digital signatures, and secure multi-party computation, which have been cited by influential works like RFC 5246 and TLS 1.3, developed by experts like Eric Rescorla and Nadia Heninger. The journal's archives are available online, providing access to a wealth of knowledge on computer security and information security research, including contributions from notable researchers like David Chaum, Silvio Micali, and Shafi Goldwasser.
The journal's scope encompasses a broad range of topics related to computer security and information security, including threat modeling, vulnerability assessment, and penetration testing, as well as cybersecurity aspects of machine learning, artificial intelligence, and Internet of Things (IoT), which are critical for securing smart cities, industrial control systems, and healthcare systems, as discussed by experts like Andrew Ng, Demis Hassabis, and Fei-Fei Li. The publication also covers cybersecurity policy, regulatory compliance, and incident response, with contributions from researchers and practitioners affiliated with organizations like Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS), and European Cybercrime Centre (EC3). The journal's coverage includes theoretical and practical aspects of computer security, with a focus on cryptographic protocols, secure coding practices, and security testing methodologies, which are essential for developing secure software systems, network protocols, and cryptographic algorithms, as highlighted by researchers like Donald Knuth, Robert Tarjan, and Adi Shamir.
The journal is published quarterly, with four issues per year, and is available in both print and digital formats, through online platforms like ACM Digital Library and IEEE Xplore. The publication is indexed by major citation databases, including Scopus, Web of Science, and Google Scholar, which provides a comprehensive overview of the journal's impact and citation metrics, as analyzed by researchers like Judea Pearl, Yoshua Bengio, and Michael I. Jordan. The journal's editorial board consists of renowned experts in computer security and information security, including Adrian Perrig, Angelos Keromytis, and Vern Paxson, who are affiliated with institutions like Carnegie Mellon University, Columbia University, and University of California, Berkeley.
The journal has a significant impact on the field of computer security and information security, with a high impact factor and a strong reputation among researchers and practitioners, as recognized by awards like National Science Foundation (NSF) Career Award and ACM SIGSAC Outstanding Innovation Award. The publication has been cited by influential works like RFC 8446 and TLS 1.3, and has contributed to the development of cybersecurity standards and guidelines, such as NIST Special Publication 800-53 and ISO/IEC 27001, which are widely adopted by organizations like National Institute of Standards and Technology (NIST), European Union Agency for Network and Information Security (ENISA), and International Organization for Standardization (ISO). The journal's articles have been presented at prominent conferences like ACM Conference on Computer and Communications Security and IEEE Symposium on Security and Privacy, and have been recognized with awards like Best Paper Award and Distinguished Paper Award, as awarded by organizations like ACM SIGSAC and IEEE Computer Society.
The journal's editorial process involves a rigorous peer review process, with submissions evaluated by at least three independent reviewers, who are experts in computer security and information security, including researchers like Ross Anderson, Niels Ferguson, and Bruce Schneier. The editorial board consists of distinguished scholars and researchers, who are responsible for selecting and reviewing submissions, as well as guiding the journal's editorial direction, with input from institutions like Massachusetts Institute of Technology, Stanford University, and University of California, Berkeley. The journal's editors work closely with authors to ensure that published articles meet the highest standards of quality, relevance, and impact, as reflected in the journal's impact factor and citation metrics, which are analyzed by researchers like Judea Pearl, Yoshua Bengio, and Michael I. Jordan. The editorial process is supported by a team of experienced editors, who are responsible for managing the review process, coordinating with authors and reviewers, and ensuring that the journal is published on schedule, with the help of organizations like Association for Computing Machinery (ACM) and IEEE Computer Society.
Category:Computer security journals