Editor's Message to Special Issue on Computer Security Technology Enriching the Future

Q4 Computer Science Journal of Information Processing Pub Date : 2013-01-01 DOI:10.2197/IPSJJIP.21.588
Y. Teshigawara
{"title":"Editor's Message to Special Issue on Computer Security Technology Enriching the Future","authors":"Y. Teshigawara","doi":"10.2197/IPSJJIP.21.588","DOIUrl":null,"url":null,"abstract":"Recently, many incidents on the APT (Advanced Persistent Threat) to the government and big companies are reported. According to the IPA report, “Attack to the vulnerability of client software” and “APT” are the top two of the top 10 threats in 2013. In addition, new threats such as abuse of social networks and conspicuous increased use of cloud computing are appearing. Moreover, along with the popularization of smart phones and tablet terminals, attacks aimed to these apparatus sprout like mushrooms and the number of attacks is considered to increase from now on. Everything from soup to nuts is connected to the Internet and conformation of “the Internet of things” where any objects connect to any objects can be seen. Information to flow into the networks is produced in significant amount and diversifies. It is desired to send such information safely and securely. Therefore, in the areas of core infrastructure, control systems, motor cars, information apparatus, medical equipments, mobile phones and etc. security is requested significantly. Moreover, since the election campaign using the Internet began this year, importance of secure and safe networks are reacknowledged. In this special issue, security technologies to realize the prosperous future of safe, secure, comfortable and human-centered lives where advantages of continuously progressing ICT are utilized effectively are widely asked for submission. This special issue focused on papers that represent such computer security technologies in terms of basic theories and techniques, protocols, architectures, software systems, applications and implementations, operation and management, and social-scientific analyses. 48 manuscripts were contributed, and 18 manuscripts were finally selected excluding one withdrawal. I believe that high level papers are selected. Based on the JIP Special Paper Selection Process commencing from this year, we have chosen a specially selected paper which is contributed by Mitsuaki Akiyama et al, “Observation for Activity of Adversary by Active CredentialInformation Leakage.” This is an excellent paper with high originality and usefulness executing long term operation and evaluation of the developed observation system. The numbers of papers in the specific areas are as follows: security fundamental technology 4, security and society 4, network security 3, risk management 2, system security 2, and distributed system operation and management, wireless/mobile network and architecture 1, respectively. Taken overall, papers are selected from wide range of areas with good balance along with our basic policy. It is expected","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"21 1","pages":"588-589"},"PeriodicalIF":0.0000,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.2197/IPSJJIP.21.588","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2197/IPSJJIP.21.588","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

Recently, many incidents on the APT (Advanced Persistent Threat) to the government and big companies are reported. According to the IPA report, “Attack to the vulnerability of client software” and “APT” are the top two of the top 10 threats in 2013. In addition, new threats such as abuse of social networks and conspicuous increased use of cloud computing are appearing. Moreover, along with the popularization of smart phones and tablet terminals, attacks aimed to these apparatus sprout like mushrooms and the number of attacks is considered to increase from now on. Everything from soup to nuts is connected to the Internet and conformation of “the Internet of things” where any objects connect to any objects can be seen. Information to flow into the networks is produced in significant amount and diversifies. It is desired to send such information safely and securely. Therefore, in the areas of core infrastructure, control systems, motor cars, information apparatus, medical equipments, mobile phones and etc. security is requested significantly. Moreover, since the election campaign using the Internet began this year, importance of secure and safe networks are reacknowledged. In this special issue, security technologies to realize the prosperous future of safe, secure, comfortable and human-centered lives where advantages of continuously progressing ICT are utilized effectively are widely asked for submission. This special issue focused on papers that represent such computer security technologies in terms of basic theories and techniques, protocols, architectures, software systems, applications and implementations, operation and management, and social-scientific analyses. 48 manuscripts were contributed, and 18 manuscripts were finally selected excluding one withdrawal. I believe that high level papers are selected. Based on the JIP Special Paper Selection Process commencing from this year, we have chosen a specially selected paper which is contributed by Mitsuaki Akiyama et al, “Observation for Activity of Adversary by Active CredentialInformation Leakage.” This is an excellent paper with high originality and usefulness executing long term operation and evaluation of the developed observation system. The numbers of papers in the specific areas are as follows: security fundamental technology 4, security and society 4, network security 3, risk management 2, system security 2, and distributed system operation and management, wireless/mobile network and architecture 1, respectively. Taken overall, papers are selected from wide range of areas with good balance along with our basic policy. It is expected
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
编者致“电脑保安科技丰富未来”特刊的寄语
最近,针对政府和大公司的APT (Advanced Persistent Threat,高级持续威胁)攻击事件屡见不新。根据IPA的报告,“对客户端软件漏洞的攻击”和“APT”是2013年十大威胁中的前两名。此外,滥用社交网络和明显增加使用云计算等新的威胁正在出现。此外,随着智能手机和平板终端的普及,针对这些设备的攻击如雨后春笋般涌现,预计今后攻击的数量还会增加。从汤到坚果的一切都连接到互联网上,形成了“物联网”,任何物体都可以连接到任何物体。流入网络的信息是大量产生和多样化的。希望安全可靠地发送这些信息。因此,在核心基础设施、控制系统、汽车、信息设备、医疗设备、移动电话等领域,对安全性的要求很高。此外,自从今年开始利用互联网进行竞选活动以来,安全可靠的网络的重要性得到了重新认识。在本期特刊中,广泛要求提交安全、可靠、舒适、以人为本的繁荣未来的安全技术,以有效利用不断进步的信息通信技术的优势。这期特刊着重于从基本理论和技术、协议、体系结构、软件系统、应用和实现、操作和管理以及社会科学分析等方面代表计算机安全技术的论文。投稿48篇,最终入选18篇,退稿1篇。我相信高水平的论文是被选中的。根据今年开始的JIP特别论文选择流程,我们选择了Mitsuaki Akiyama等人贡献的一篇特别选择的论文,“通过主动凭证信息泄漏观察对手的活动”。这是一篇对已开发的观测系统进行长期运行和评价的极具独创性和实用性的论文。具体领域的论文数量分别为:安全基础技术4、安全与社会4、网络安全3、风险管理2、系统安全2、分布式系统运营与管理、无线/移动网络与架构1。总的来说,论文的选择范围很广,与我们的基本政策保持着良好的平衡。这是预料之中的
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Information Processing
Journal of Information Processing Computer Science-Computer Science (all)
CiteScore
1.20
自引率
0.00%
发文量
0
期刊最新文献
Container-native Managed Data Sharing Editor's Message to Special Issue of Computer Security Technologies for Secure Cyberspace Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers An Analysis of Susceptibility to Phishing via Business Chat through Online Survey Analysis and Consideration of Detection Methods to Prevent Fraudulent Access by Utilizing Attribute Information and the Access Log History
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1