American Journal of Operations Management and Information Systems

Special Issue

Security Computing

  • Submission Deadline: 10 April 2020
  • Status: Submission Closed
  • Lead Guest Editor: Fang Zhao
About This Special Issue
Recently, with the development of a third-party payment platform, the development of online trading, electronic trading could be seen everywhere in our daily life. Compared with the previous businesses where the merchants and customers have to face to face, it brings much convenience and a series of security issues. The funds may be illegal to paraphrase by malicious users, and then bring certain losses to the businessman, consumers or the third-party payment platform. Petri nets as a formal method could be used to analysis the security issues better and easily.

Aims and Scope:

  1. Petri nets
  2. Control flow
  3. Data flow
  4. Consistency
  5. Behavioral profile
  6. Data flow errors
Lead Guest Editor
  • Fang Zhao

    Tongji university, Shanghai, China

Guest Editors
  • Jing Zhu

    University of Science and Technology of China, Hefei, China

  • Neema Elharoun

    Department of Statistics, North Sinai university, North Sinai City, Egypt