W3C home > Mailing lists > Public > www-rdf-interest@w3.org > April 2008

CFP: Research Handbook on Information Security

From: Pit Pichappan <ppichappan@gmail.com>
Date: Tue, 29 Apr 2008 17:48:59 +0530
Message-ID: <9a6ac0310804290518g5e0e02eag7b3da69b12ac9f1c@mail.gmail.com>
To: contact@mycollegeusa.com, www-rdf-interest@w3.org, computational.science@lists.OptimaNumerics.com

Call for Chapter Proposal

Handbook of Research on Threat Management and
Information Security: Models for Countering Attacks, Breaches and
Intrusions.

Publishers: IGI Global - (Disseminator of Knowledge Since 1988)
(formerly "Idea Group Inc.")
701 E. Chocolate Avenue., Suite 200
Hershey, Pennsylvania 17033, USA

http://www.dirf.org/security

Increasingly, the global society is adapting to the computerized
information systems for all data and information transactions. People
tend to store all their personal, business and public information on
the web for enhanced storage, search and access. While society relies
on web and computerized information storage, attackers misuse the
technology and secure the sensitive information. To prevent such
attacks, information security researchers have developed mechanisms
and technology to protect data loss and intrusion. Intrusion and
prevention are on-going processes and technology development reflects
upon these operations. Users need to understand the data protection
mechanisms comprehensively. Comprehensive knowledge on information
security is required not only for researchers and practitioners, but
also for policy makers, system managers, owners and administrators.
The process of building and imparting information security knowledge
is possible through the creation of a comprehensive collection of
research on the topic.. Unfortunately, such a collection of research
on security does not exist. The forthcoming handbook on Information
Security will address significant issues in the field.

Submission and Review Process

Researchers and practitioners are invited to submit a 2-5 page
manuscript proposal clearly explaining the objective and concerns of
the proposed chapter on or before May 15. Authors of accepted
proposals will be notified about the status of their proposals and
sent chapter organizational guidelines. Full chapters should be about
8,000-10,000 words in length and expected to be submitted by September
30, 2008.

All chapters will be subject to a double-blind peer review process.

The proposed handbook would address the following titles, but not limited.

Access Control
Accounting and Audit
Anonymity and Pseudonymity
Applied Cryptography
Application Security
Attacks and Prevention of Online Fraud
Authentication and Non-repudiation
Biometrics
Computer crimes
Content dependant access control
Cryptographic Protocols and Functions
Cyber attacks
Database Security
Data-loss prevention
Design and Analysis of Cryptographic Algorithms
Digital Certificates
Digital Rights Management
Economics of Security and Privacy
Email Security
Encryption standards
Firewall Management
Formal Methods in Security
Foundations of Computer Security
GSM/3G Devices
Identity and Trust Management
Image-based spams
Information Hiding and Watermarking
Infrastructure Security
Information Phising
Information Security Training
Insiders Threat Management
Intrusion Detection, Tolerance and
Prevention	Mobile, Ad Hoc and Sensor Network Security
Network and Wireless Network Security
Peer-to-Peer Network Security
PKI and PMI
Private Searches
Instant Message Security
Integrated Trust Management
Malware
Patch Management
Risk Management
Role Based Access Control Models
Security Audit
Security and Ontology
Security Architectures
Security Intelligence
Security and Privacy in Pervasive/Ubiquitous
Computing
Security in Information Flow
Security for Mobile Code
Security of Grid Computing
Security of eCommerce, eBusiness and
eGovernment
Security Toolkit
Security Modeling and Architectures
Security Models for Ambient Intelligence
environments
Security Policies and Standards
Spyware
SSL Technology
Storage Security
Trusted Computing
Usable Security
Virus Protection
Vulnerability Assessment Management
Wireless network security

Submission at
http://www.dirf.org/security

Important Dates
 Submission of Proposals:15 May 2008
 Selection of Proposals:31 May 2008
 Preliminary review and revision:15 June 2008
 Second Review and Revision: 1 Aug 2008
 Camera ready chapters:	15 Oct 2008

Editor: Pit Pichappan
Faculty of Computer and Information Sciences
Al Imam Saad Bin University
Riyadh. Saudi Arabia
Email: ppichappan@gmail.com , pichappan@dirf.org
-----------------------------------------------------------------------------
Received on Tuesday, 29 April 2008 12:19:40 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Monday, 7 December 2009 10:52:22 GMT