- From: Pit Pichappan <ppichappan@gmail.com>
- Date: Tue, 29 Apr 2008 17:48:59 +0530
- To: contact@mycollegeusa.com, www-rdf-interest@w3.org, computational.science@lists.OptimaNumerics.com
Call for Chapter Proposal Handbook of Research on Threat Management and Information Security: Models for Countering Attacks, Breaches and Intrusions. Publishers: IGI Global - (Disseminator of Knowledge Since 1988) (formerly "Idea Group Inc.") 701 E. Chocolate Avenue., Suite 200 Hershey, Pennsylvania 17033, USA http://www.dirf.org/security Increasingly, the global society is adapting to the computerized information systems for all data and information transactions. People tend to store all their personal, business and public information on the web for enhanced storage, search and access. While society relies on web and computerized information storage, attackers misuse the technology and secure the sensitive information. To prevent such attacks, information security researchers have developed mechanisms and technology to protect data loss and intrusion. Intrusion and prevention are on-going processes and technology development reflects upon these operations. Users need to understand the data protection mechanisms comprehensively. Comprehensive knowledge on information security is required not only for researchers and practitioners, but also for policy makers, system managers, owners and administrators. The process of building and imparting information security knowledge is possible through the creation of a comprehensive collection of research on the topic.. Unfortunately, such a collection of research on security does not exist. The forthcoming handbook on Information Security will address significant issues in the field. Submission and Review Process Researchers and practitioners are invited to submit a 2-5 page manuscript proposal clearly explaining the objective and concerns of the proposed chapter on or before May 15. Authors of accepted proposals will be notified about the status of their proposals and sent chapter organizational guidelines. Full chapters should be about 8,000-10,000 words in length and expected to be submitted by September 30, 2008. All chapters will be subject to a double-blind peer review process. The proposed handbook would address the following titles, but not limited. Access Control Accounting and Audit Anonymity and Pseudonymity Applied Cryptography Application Security Attacks and Prevention of Online Fraud Authentication and Non-repudiation Biometrics Computer crimes Content dependant access control Cryptographic Protocols and Functions Cyber attacks Database Security Data-loss prevention Design and Analysis of Cryptographic Algorithms Digital Certificates Digital Rights Management Economics of Security and Privacy Email Security Encryption standards Firewall Management Formal Methods in Security Foundations of Computer Security GSM/3G Devices Identity and Trust Management Image-based spams Information Hiding and Watermarking Infrastructure Security Information Phising Information Security Training Insiders Threat Management Intrusion Detection, Tolerance and Prevention Mobile, Ad Hoc and Sensor Network Security Network and Wireless Network Security Peer-to-Peer Network Security PKI and PMI Private Searches Instant Message Security Integrated Trust Management Malware Patch Management Risk Management Role Based Access Control Models Security Audit Security and Ontology Security Architectures Security Intelligence Security and Privacy in Pervasive/Ubiquitous Computing Security in Information Flow Security for Mobile Code Security of Grid Computing Security of eCommerce, eBusiness and eGovernment Security Toolkit Security Modeling and Architectures Security Models for Ambient Intelligence environments Security Policies and Standards Spyware SSL Technology Storage Security Trusted Computing Usable Security Virus Protection Vulnerability Assessment Management Wireless network security Submission at http://www.dirf.org/security Important Dates Submission of Proposals:15 May 2008 Selection of Proposals:31 May 2008 Preliminary review and revision:15 June 2008 Second Review and Revision: 1 Aug 2008 Camera ready chapters: 15 Oct 2008 Editor: Pit Pichappan Faculty of Computer and Information Sciences Al Imam Saad Bin University Riyadh. Saudi Arabia Email: ppichappan@gmail.com , pichappan@dirf.org -----------------------------------------------------------------------------
Received on Tuesday, 29 April 2008 12:19:40 UTC