Journal of Computer Security
The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. It also provides a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community.
The journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications. The journal welcomes contributions on all aspects of computer security: confidentiality, integrity, and assurance of service - that is, protection against unauthorized disclosure or modification of sensitive information, or denial of service. Of interest is a precise understanding of security policies through modelling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware systems implementing them.
Dr. Véronique Cortier
Dr. Peng Liu
Prof. Sushil Jajodia
Dr. Jonathan Millen
Gilles Barthe, IMDEA Software Inst., Spain
SUBMISSION OF MANUSCRIPTS
Authors are requested to submit their manuscript electronically to the journal’s editorial management system in the form of a PDF file.
Authors are encouraged to use the JCS LaTeX style file to follow the formatting rules explained in more detail below.
Submitted manuscripts must represent original material, and no version of the submission can be simultaneously submitted to any conference, journal, or any other publication. The journal encourages submissions which have not been previously published. JCS also publishes papers that are significant extensions of outstanding papers published elsewhere (see Prior Publication Policy).
The journal discourages the submission of excessively long papers (longer than 45 pages in JCS format, including figures and references, but excluding appendices), and unnecessary digressions even in shorter papers. The restrictions is to motivate authors to bring out the essence of their papers more clearly, to make it easier for the reviewers and readers. Typical expected length is around 30 pages. Material above 45 pages should be included as an appendix.
Submitted papers are evaluated by anonymous referees for originality, relevance, and presentation. All accepted papers receive at least three reviews.
The journal is committed to provide an editorial decision within 3 months of submission. The reviewing process may take longer for unusually long submissions.
The Journal of Computer Security does not charge a publication fee.
Manuscripts must be written in English. Authors whose native language is not English are advised to seek the advice of a native English speaker, before submitting their manuscripts. Peerwith offers a language and copyediting service to all scientists who want to publish their manuscript in scientific peer-reviewed periodicals and books.
Submitted manuscripts must be formatted to print on either A4 or US Letter sized paper. Regardless of the size of the paper, the text block must fit within a centered rectangle 15.1cm wide and 19.5cm tall. All content, including figures, tables, and footnotes, must fit within this text block. Text should be printed in a single column using at least an 11 point Roman font on at least 12.375 point leading. We have made available an IOS LaTeX style file that will format text according to these requirements.
Every page of the manuscript should be numbered. No reference should be made in the text to page numbers.
Symbols and labels used in plots and figures should be easily readable and interpretable when printed; they should not rely on on-screen magnification to be intelligible. Please also avoid the excessive use of italics and bold face.
Prior Publication Policy
Submissions that are extensions of one or more papers (by one or more of the authors) previously appeared elsewhere must have a major value-added extension over what appeared previously. In particular, a submission based on previous publications should have at least 25% new material. This new material should be significant new content: it cannot be simply some rewriting, trivial proofs, or performance figures that offer no new insight. Previous publications should be explicitly referenced in the submission and the added value over them explicitly discussed in the manuscript.
The authors should prepare a single PDF file collating:
- A cover letter detailing the novel added value with respect to previous publications;
- The manuscript under submission;
- Previous papers of which the manuscript being submitted is an extension.
Such PDF file should then be uploaded on Editorial Manager.
PREPARATION OF MANUSCRIPTS ONCE ACCEPTED
For initial submission a .pdf file of the article is sufficient. After an article has been accepted for publication an editable file of the text, such as MsWord or LateX, is required. If you are uploading a paper that has been accepted for publication or accepted pending minor revisions please upload the source files of the paper. If using LaTeX please use our LaTeX template and also send a pdf version of the LaTeX file as well as separate files of all figures (if any); see "Preparation of manuscripts" for the required file formats. LaTeX packages should be compiled into .zip or .rar files.
It is possible to have figures printed in colour, provided the cost of their reproduction is paid for by the author. See Preparation of Manuscripts for the required file formats.
Open Access option
The IOS Press Open Library® offers authors an Open Access (OA) option. By selecting the OA option, the article will be freely available from the moment it is published, also in the pre-press module. In the Open Library® the article processing charges are paid in the form of an Open Access Fee. Authors will receive an Open Access Order Form upon acceptance of their article. Open Access is entirely optional.
See also our website for more information about this option IOS Press Open Library®.
This journal publishes all its articles in the IOS Press Pre-Press module. By publishing articles ahead of print the latest research can be accessed much quicker. The pre-press articles are the corrected proof versions of the article and are published online shortly after the proof is created and author corrections implemented. Pre-press articles are fully citable by using the DOI number. As soon as the pre-press article is assigned to an issue, the final bibliographic information will be added. The pre-press version will then be replaced by the updated, final version.
Copyright of your article
Authors submitting a manuscript do so on the understanding that they have read and agreed to the terms of the IOS Press Author Copyright Agreement.
Quoting from other publications
An author, when quoting from someone else's work or when considering reproducing figures or table from a book or journal article, should make sure that he is not infringing a copyright. Although in general an author may quote from other published works, he should obtain permission from the holder of the copyright if he wishes to make substantial extracts or to reproduce tables, plates or other figures. If the copyright holder is not the author of the quoted or reproduced material, it is recommended that the permission of the author should also be sought. Material in unpublished letters and manuscripts is also protected and must not be published unless permission has been obtained. Submission of a paper will be interpreted as a statement that the author has obtained all the necessary permission. A suitable acknowledgement of any borrowed material must always be made.
PRE-PRESS AND PROOFS
Accepted articles will be placed online as "pre-press" articles shortly after acceptance. This process will occur before the author receives proofs. The pre-press file will remain as the uncorrected proof version until the article is published in an issue and the final published version replaces the pre-press file.
The corresponding author will receive a pdf proof and is asked to check this proof carefully (the publisher will execute a cursory check only). Corrections other than printer's errors, however, should be avoided. Costs arising from such corrections will be charged to the authors.
How to order reprints, a PDF file, journals, or IOS Press books
The corresponding author of a contribution to the journal will receive a complimentary PDF Author’s Copy of the article, unless otherwise stated. This PDF copy is watermarked and for personal use only. A free PDF copy will not be provided for conference proceedings and abstract issues. An order form for a PDF file without watermark, reprints or additional journal copies will be provided along with the PDF proof.
If you wish to order reprints of an earlier published article, please contact the publisher for a quotation. IOS Press, Fax: +31 20 687 0019. Email: firstname.lastname@example.org.
An author is entitled to 25 % discount on IOS Press books. See Author's discount (25%) on all IOS Press book publications.
Authors of published articles (non-prepress, final articles) will be contacted by Kudos. Kudos is a service that helps researchers maximize the impact and visibility of their research. It allows authors to enrich their articles with lay metadata, add links to related materials and promote their articles through the Kudos system to a wider public. Authors will receive no more than three emails: one invitation and a maximum of two reminders to register for the service and link the published article to their profile. Using and registering for Kudos remains entirely optional. For more information, please have a look at our authors section.
HOW TO PROMOTE YOUR WORK
Would you like some pointers on how to help your research achieve a wider reach and greater impact? Please consult our Promotional Toolkit for Authors for tips.
ACM Computing Reviews
ACM Digital Library
Business Source Complete
Cambridge Scientific Abstracts
Computer Literature Index
Computer Science Index
DBLP Bibliography Server
Emerald Management Reviews
International Security & Counter-Terrorism Reference Center
Microsoft Academic Search
Ulrich's Periodicals Directory
Web of Science: BIOSIS Previews
Web of Science: Emerging Sources Citation Index
29 Oct 2015 - IOS Press is delighted to announce that eleven of its journals will be included in the Emerging Sources Citation Index (ESCI), a new index to be launched by Thomson Reuters in November 2015. ...
25 Apr 2014 - The Journal of Computer Security has published a special issue on Web Applications Security in honor of the Web at 25 celebrations. All articles of this special issue are freely available online....
Journal of Computer Security Peer Review Policy
Journal of Computer Security is a peer-reviewed journal. All articles submitted to the journal undergo a single blind peer review process. This means that the identity of the authors is known with the reviewers but the identity of the reviewers is not communicated to the authors.
Each submitted article is pre-screened by the Editors-in-Chief to decide if it is suitable to be sent out for formal review. Reasons to reject a paper in the pre-screening process could for example be because the work does not fall within the aims and scope, the writing is of poor quality, the instructions to authors were not followed or the presented work is not novel.
Papers deemed suitable to be reviewed will be assigned a handling editor. The handling editor will then invite reviewers to comment on the work. Typically, a minimum of two reviews are required to be able make a decision on a paper.
Reviewers are asked to judge a paper on at least:
- Relevance to the journal
- Significance of results
- Depth of results
- Correctness of results
- Clarity of presentation
Based on the received reviews the handling editor will propose to the Editors-in-Chief their recommendation:
- Accept as is
- Accept Pending Minor Revisions
- Revise and Resubmit
- Reject Outright
For articles that receive a Revise and Resubmit decision, often major revisions are required and articles may still be rejected in a second round of peer review.
Accept or reject decisions are made by the Editors-in-Chief, whose decision is final.