W3C home > Mailing lists > Public > semantic-web@w3.org > January 2012

CfC Proposals: Theory and Practice of Cryptography Solutions for Secure Information Systems

From: Atilla Elçi <atilla.elci@emu.edu.tr>
Date: Thu, 12 Jan 2012 14:58:03 +0200
To: <semantic-web@w3.org>
Message-ID: <0a9701ccd129$d26db050$774910f0$@elci@emu.edu.tr>
Ref.: Ontology of Cryptographic Solutions

Final CALL FOR CHAPTER PROPOSALS
================================
2-page Proposal Submission Deadline: January 20, 2012

Theory and Practice of Cryptography Solutions for Secure Information Systems
============================================================================
An edited book to be published by IGI Global 

Introduction 
============
Information systems (IS) play a central part in all aspects of our world
from science, engineering to industry, from business, law, politics to
government, from culture, society to health, from operational support in
daily life, and homeland protection to national security. Without proper
security precautions, IS are prone to intolerable side effects such as
leakage of operational and confidential data, identity theft and
unauthorized access, and possibly modification of private data, services and
systems. Security services are required in order to guarantee information
security and privacy protection, such as data confidentiality, data
authentication, anonymity, and entity authentication, non-repudiation of
origin and receipt, access control, protection against denial of service,
and secure processing and deletion of data. In summary, dependable and
trustworthy security solutions based on strong cryptography are needed.

Objectives of the Book
======================
This book will focus on cryptography and its use for security of IS. It will
also serve as a valuable source for information security and associated
concerns in IS, providing the reader state-of-the-art technologies and
practices for creating secure IS through cryptographic solutions. Hence,
manuscripts will be expected to cover recent research and advanced
development in the use of cryptography in IS. In addition, topics related to
cryptography and networks, which are part of the environments in which
secure information systems must operate, will be considered favorably. 
Chapter manuscripts will be chosen through peer/expert reviews to achieve
high quality and maturity of expression. As such we hope to compile the best
manuscripts to cover the intended sequence of topics. We expect this book to
receive high citation in the areas of information security, secure
information systems, applied mathematics, and computer science.

Target Audience 
===============
This edited book on cryptography and IS will propose contributions on a wide
range of topics on foundations and applications written by a selection of
international experts. We aim to bring about a book covering the theory,
practice, and tools of cryptography in producing secure IS. It will
introduce fundamentals briefly but dwell on advanced topics at much greater
length. As such it will serve the needs of advanced learners, faculty and
graduate students alike, and should be suitable for practitioners,
individual learners, and classroom adoption. The book will also serve as an
important reference for developers of secure IS applications and industry
practitioners.

Recommended topics in theory, tools, and applications of cryptographic
solutions for information systems include, but are not limited to the
following:
.             Cryptography                       
.             Cryptography and Security          
.             Cryptography and Data Protection   
.             Cryptography and Privacy                
.             Cryptographic Protocols                           
.             Cryptographic Solutions                           
.             Copyright protection                 
.             Agent & Multi-agent System Security
.             Authentication & Authorization
.             Engineering Secure Information Systems
.             Forensics and Ethical Hacking
.             Key Management
.             Cryptography and Cryptanalysis
.             Ontology of Cryptographic Solutions
.             Public-key Crypto Systems
.             Standards, guidelines and certification

Detailed IGI Book CfCP is available at http://bit.ly/seRo4t. Manuscripts in
which cryptographic solutions for IS are not the main focus will not be
accepted.

Submission Procedure 
====================
Researchers and practitioners are invited to submit by January 20, 2012, a
2-3 page chapter proposal clearly explaining the contributions of the
chapter and how it will address a cryptographic solution for IS. Authors of
accepted proposals will be notified at the most in three weeks and sent
chapter guidelines. Full chapters of about 20 pages are expected to be
submitted by April 27, 2012. All the submitted chapters will be reviewed on
a double-blind review basis. Contributors may also be requested to serve as
reviewers for this project.
All proposals must be submitted electronically via the Submission Site
(https://cmt.research.microsoft.com/CRYPSIS2012/) by the due date.

Publisher
=========
This book is scheduled to be published by IGI Global (formerly Idea Group
Inc.), publisher of the "Information Science Reference" (formerly Idea Group
Reference), "Medical Information Science Reference," "Business Science
Reference," and "Engineering Science Reference" imprints. For additional
information about the publisher, please visit www.igi-global.com. This book
is planned to be released early in late 2013.

Important Dates
===============
January 20, 2012: Final Proposal Submission Deadline      
April 27, 2012: Full Chapter Submission   
July 27, 2012: Review Results Returned  
Aug 30, 2012: Revised Chapter Submission
Sep 30, 2012: Final Acceptance Notification
Oct 15, 2012: Final Chapter Submission

Contact Details
===============
Inquiries may be forwarded by e-mail through the submission site, or
directly addressed to the editors: 
Atilla ELCI (Suleyman Demirel University, Turkey, atilla.elci@gmail.com), 
Josef PIEPRZYK (Macquarie University, Australia, josef.pieprzyk@mq.edu.au), 
Alexander CHEFRANOV (Eastern Mediterranean University, North Cyprus,
alexander.chefranov@emu.edu.tr), 
Mehmet ORGUN (Macquarie University, Australia, mehmet.orgun@mq.edu.au), 
Huaxiong WANG (Nanyang Technological University, Singapore,
hxwang@ntu.edu.sg), and 
Rajan SHANKARAN (Macquarie University, Australia,
rajan.shankaran@mq.edu.au).
---------------
:| Feeling better
Yeni yılınız kutlu olsun. / I wish you a happy new year. 
Atilla Elci, Ph.D.
http://member.acm.org/~aelci 
http://suleyman-demirel.academia.edu/AtillaElçi/
www.linkedin.com/profile/view?id=32895885&trk=tab_pro
IGI Book CfCP: http://bit.ly/seRo4t
http://www.intechweb.org/welcome/8a1290de1769ec93ed92327f93a9a4bb/
ESAS 2012: http://compsac.cs.iastate.edu/workshop_details.php?id=49&y
Wiley Conc & Comp'n SI CFP: http://tinyurl.com/Wiley-CC-SI
Springer Nw Sc SI CFP: http://tinyurl.com/Springer-NS-SI
COMPSAC 2012 CFP: www.compsac.org
SIN 2012 CFP: www.sinconf.org/sin2012/
CFP: Wiley SCN :  http://tinyurl.com/SCN-SI-SINConf
Springer Book: http://tinyurl.com/ESAS-book
Received on Thursday, 12 January 2012 13:03:27 GMT

This archive was generated by hypermail 2.3.1 : Tuesday, 26 March 2013 21:45:46 GMT