25 years since its creation, the world wide web has taken over the world as the global computing platform. A package of technologies, often referred to as Web 2.0, has revolutionized the web in recent years, moving from a static client–server paradigm to a highly dynamic and interactive paradigm for computation by multiple servers and clients. The power of web applications drives the evolution of the web, which makes securing web applications a critical goal.
Volume 22, Number 4 / 2014 Special Issue on Web Application Security – Web @ 25
About the Journal The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. It also provides a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community.
The journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications. The journal welcomes contributions on all aspects of computer security: confidentiality, integrity, and assurance of service - that is, protection against unauthorized disclosure or modification of sensitive information, or denial of service. Of interest is a precise understanding of security policies through modelling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware systems implementing them.
Editors-in-Chief Prof. Pierangela Samarati Department of Information Technology Università degli Studi di Milano Via Bramante 65 Crema, I-26013 Italy Email: firstname.lastname@example.org
Prof. Andrew Myers 4133 Upson Hall Department of Computer Science Cornell University Ithaca, NY 14853-7501 USA Email: email@example.com
Abstracted/Indexed in Academic Source Complete, ACM Computing Reviews, ACM Digital Library, BIOSIS Previews, Business Source Complete, Cambridge Scientific Abstracts, Compendex, Computer Abstracts, Computer Literature Index, Computer Science Index, CPX, CSA Illumina, DBLP Bibliography Server, EBSCO database, Emerald Management Reviews, Inspec IET, International Security & Counter-Terrorism Reference Center, MasterFILE, Microsoft Academic Search, Scopus, Ulrich's Periodicals Directory