About the Journal

Aims and Scope

Growing threats and increasingly also failures due to complexity may compromise the security and resilience of network and service infrastructures. Applications and services require the security of data handling and we need new security architectures and scalable and interoperable security policies for this. There is a need to guarantee end-to-end security in data communications and storage, including identity management and authentication.

Moreover, we need technology to enable network security monitoring and tracing and to assess the trustworthiness of infrastructures and services. It must ensure the protection of personal data and privacy and properly assign liability and risks, together with the appropriate governance models needed to do so. Furthermore, this is applied to the settings of Public Safety in general.

Article Processing Charge (APC)

In this journal, we do not apply APC for the processing or publication of articles.

Frequency

This is a quarterly journal in which four issues are published per year covering the periods January-March, April-June, July-September, and October-December.

Copyright notice

Authors retain copyright over their materials and are free to copy, redistribute, remix, transform, and build upon the material since all the papers are published under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) license.

Archiving

All the articles published by EAI are archived using Portico's e-journal preservation service, together with CLOCKSS and LOCKSS. This ensures that all articles published are preserved and available for future researchers and students.

Privacy statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.