Journal Information
ACM Transactions on Privacy and Security (TOPS)
https://dl.acm.org/journal/topsImpact Factor: |
2.8 |
Publisher: |
ACM |
ISSN: |
2471-2566 |
Viewed: |
9012 |
Tracked: |
5 |
Call For Papers
ACM Transactions on Transactions on Privacy and Security (TOPS) is devoted to the study, analysis, and application of information security and privacy. The journal takes a wide view of this topic and its mission is to publish the best original research in this area.
Submitted papers should have practical relevance to the construction, evaluation, application, or operation of security or privacy-critical systems. Theoretical papers must provide compelling examples and make convincing arguments for the practical significance of their results. Tutorial or survey papers will not be considered for publication.
TOPS was previously titled the ACM Transactions on Information and System Security (TISSEC), which was founded in 1998. The renaming took place in 2016 to emphasize the journal's enlarged scope and its additional emphasis on privacy. This journal is published on a quarterly basis.
Relevant topics of interest include:
Security Technologies: authentication; authorization models and mechanisms; auditing and intrusion detection; cryptographic algorithms, protocols, services, and infrastructure; recovery and survivable operation; risk analysis; assurance including cryptanalysis and formal methods; penetration technologies including viruses, Trojan horses, spoofing, sniffing, cracking, and covert channels.
Fundamentals: theory of security and privacy; models of trust; methods for quantifying the risk of the disclosure of private information or the risk a system will be compromised; mechanisms and algorithms that have wide application, including privacy models (e.g. k-anonymity based models and knowledge hiding models), and methods of secure communication with various properties (e.g. non-repudiation or forward secrecy).
Secure Systems: secure operating systems, database systems and networks; secure distributed systems including security middleware; secure web browsers, servers, and mobile code; specialized secure systems for specific application areas; interoperability, and composition.
Privacy Methods: methods to offer location privacy; anonymization techniques for users and their data; statistical disclosure control techniques; private information retrieval; protocols for secure multiparty communications, protecting confidential consumer data, and the like.
Security and Privacy Applications: threats, system tradeoffs, and unique needs of applications; representative application areas include information systems, workflows, cloud computing, cyber-physical systems, electronic commerce, electronic cash, electronic voting, copyright and intellectual property protection, telecommunications systems, wireless systems, and health care. Design of security and privacy (user experience and usability).
Privacy and Security Policies: confidentiality, integrity, availability, privacy, usage, and survivability policies; tradeoffs, conflicts and synergy among security and privacy objectives.
Note: Submissions on watermarking or steganography are currently out of scope of interest for ACM TOPS.
Last updated by Dou Sun in 2026-01-03
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| Computer Law & Security Review | 3.2 | Elsevier | 0267-3649 | |
| c | Computer Law and Security Review | 3.2 | Elsevier | 0267-3649 |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Archival Science | 1.400 | Springer | 1389-0166 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| IEEE Transactions on Information Forensics and Security | 8.0 | IEEE |
| Computers & Security | 5.4 | Elsevier |
| Journal of Cybersecurity | 3.2 | Oxford University Press |
| Computer Law & Security Review | 3.2 | Elsevier |
| Computer Law and Security Review | 3.2 | Elsevier |
| ACM Transactions on Privacy and Security | 2.8 | ACM |
| International Journal of Information Security | 2.400 | Springer |
| EURASIP Journal on Information Security | 2.1 | Springer |
| Archival Science | 1.400 | Springer |
| IET Information Security | 1.300 | IET |
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| a | a* | a1 | Security | USENIX Security Symposium | 2026-01-29 | 2026-08-12 | |
| c | EuroS&P | IEEE European Symposium on Security and Privacy | 2025-11-13 | 2026-03-05 | 2026-07-06 | ||
| b | b3 | ICISS | International Conference on Information Systems Security | 2025-08-10 | 2025-10-03 | 2025-12-16 | |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | b2 | PST | International Conference on Privacy, Security and Trust | 2025-04-04 | 2025-06-01 | 2025-08-26 | |
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2025-02-13 | 2025-05-12 | 2025-08-10 |
| b | NSS | International Conference on Network and System Security | 2023-03-03 | 2023-05-05 | 2023-08-14 | ||
| b | TrustBus | International Conference on Trust, Privacy, and Security in Digital Business | 2022-03-07 | 2022-05-10 | 2022-08-22 | ||
| b | IWSEC | International Workshop on Security | 2019-04-02 | 2019-05-27 | 2019-08-28 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 |
| Short | Full Name | Conference |
|---|---|---|
| Security | USENIX Security Symposium | 2026-08-12 |
| EuroS&P | IEEE European Symposium on Security and Privacy | 2026-07-06 |
| ICISS | International Conference on Information Systems Security | 2025-12-16 |
| ISC | Information Security Conference | 2025-10-20 |
| PST | International Conference on Privacy, Security and Trust | 2025-08-26 |
| SOUPS | International Symposium On Usable Privacy and Security | 2025-08-10 |
| NSS | International Conference on Network and System Security | 2023-08-14 |
| TrustBus | International Conference on Trust, Privacy, and Security in Digital Business | 2022-08-22 |
| IWSEC | International Workshop on Security | 2019-08-28 |
| IAS | International Conference on Information Assurance and Security | 2015-12-07 |