CFP: Research Handbook on Information Security

Call for Chapter Proposal

Handbook of Research on Threat Management and
Information Security: Models for Countering Attacks, Breaches and
Intrusions.

Publishers: IGI Global - (Disseminator of Knowledge Since 1988) 
(formerly "Idea Group Inc.")
701 E. Chocolate Avenue., Suite 200
Hershey, Pennsylvania 17033, USA

http://www.dirf.org/security

Increasingly, the global society is adapting to the computerized information
systems for all data and information transactions. People tend to store all
their personal, business and public information on the web for enhanced
storage, search and access. While society relies on web and computerized
information storage, attackers misuse the technology and secure the
sensitive information. To prevent such attacks, information security
researchers have developed mechanisms and technology to protect data loss
and intrusion. Intrusion and prevention are on-going processes and
technology development reflects upon these operations. Users need to
understand the data protection mechanisms comprehensively. Comprehensive
knowledge on information security is required not only for researchers and
practitioners, but also for policy makers, system managers, owners and
administrators. The process of building and imparting information security
knowledge is possible through the creation of a comprehensive collection of
research on the topic.. Unfortunately, such a collection of research on
security does not exist. The forthcoming handbook on Information Security
will address significant issues in the field.

Submission and Review Process

Researchers and practitioners are invited to submit a 2-5 page manuscript
proposal clearly explaining the objective and concerns of the proposed
chapter on or before May 15. Authors of accepted proposals will be notified
about the status of their proposals and sent chapter organizational
guidelines. Full chapters should be about 8,000-10,000 words in length and
expected to be submitted by September 30, 2008.

All chapters will be subject to a double-blind peer review process.

The proposed handbook would address the following titles, but not limited.

Access Control
Accounting and Audit
Anonymity and Pseudonymity
Applied Cryptography
Application Security 
Attacks and Prevention of Online Fraud
Authentication and Non-repudiation
Biometrics
Computer crimes 
Content dependant access control
Cryptographic Protocols and Functions
Cyber attacks
Database Security
Data-loss prevention
Design and Analysis of Cryptographic Algorithms
Digital Certificates
Digital Rights Management
Economics of Security and Privacy
Email Security
Encryption standards
Firewall Management
Formal Methods in Security
Foundations of Computer Security
GSM/3G Devices
Identity and Trust Management
Image-based spams
Information Hiding and Watermarking 
Infrastructure Security
Information Phising
Information Security Training
Insiders Threat Management
Intrusion Detection, Tolerance and 
Prevention	Mobile, Ad Hoc and Sensor Network Security
Network and Wireless Network Security
Peer-to-Peer Network Security
PKI and PMI
Private Searches
Instant Message Security
Integrated Trust Management
Malware
Patch Management
Risk Management
Role Based Access Control Models
Security Audit
Security and Ontology
Security Architectures
Security Intelligence
Security and Privacy in Pervasive/Ubiquitous 
Computing
Security in Information Flow
Security for Mobile Code
Security of Grid Computing
Security of eCommerce, eBusiness and 
eGovernment
Security Toolkit
Security Modeling and Architectures
Security Models for Ambient Intelligence 
environments
Security Policies and Standards
Spyware
SSL Technology
Storage Security
Trusted Computing
Usable Security
Virus Protection
Vulnerability Assessment Management
Wireless network security

Submission at
http://www.dirf.org/security

Important Dates
 Submission of Proposals:15 May 2008
 Selection of Proposals:31 May 2008
 Preliminary review and revision:15 June 2008
 Second Review and Revision: 1 Aug 2008
 Camera ready chapters:	15 Oct 2008

Editor: Pit Pichappan
Faculty of Computer and Information Sciences
Al Imam Saad Bin University
Riyadh. Saudi Arabia
Email: ppichappan@gmail.com , pichappan@dirf.org 
-----------------------------------------------------------------------------
-- 
View this message in context: http://www.nabble.com/CFP%3A-Research-Handbook-on-Information-Security-tp16958835p16958835.html
Sent from the w3.org - semantic-web mailing list archive at Nabble.com.

Received on Tuesday, 29 April 2008 11:59:14 UTC