ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CfC 2012 - CfC Proposals: Theory and Practice of Cryptography Solutions for Secure Information Systems

Date2012-10-15

Deadline2012-01-20

VenueOnline, Online Online

Keywords

Website

Topics/Call fo Papers

2-page Proposal Submission Deadline: January 20, 2012
Theory and Practice of Cryptography Solutions for Secure Information Systems

An edited book to be published by IGI Global
Introduction

Information systems (IS) play a central part in all aspects of our world from science, engineering to industry, from business, law, politics to government, from culture, society to health, from operational support in daily life, and homeland protection to national security. Without proper security precautions, IS are prone to intolerable side effects such as leakage of operational and confidential data, identity theft and unauthorized access, and possibly modification of private data, services and systems. Security services are required in order to guarantee information security and privacy protection, such as data confidentiality, data authentication, anonymity, and entity authentication, non-repudiation of origin and receipt, access control, protection against denial of service, and secure processing and deletion of data. In summary, dependable and trustworthy security solutions based on strong cryptography are needed.
Objectives of the Book

This book will focus on cryptography and its use for security of IS. It will also serve as a valuable source for information security and associated concerns in IS, providing the reader state-of-the-art technologies and practices for creating secure IS through cryptographic solutions. Hence, manuscripts will be expected to cover recent research and advanced development in the use of cryptography in IS. In addition, topics related to cryptography and networks, which are part of the environments in which secure information systems must operate, will be considered favorably.
Chapter manuscripts will be chosen through peer/expert reviews to achieve high quality and maturity of expression. As such we hope to compile the best manuscripts to cover the intended sequence of topics. We expect this book to receive high citation in the areas of information security, secure information systems, applied mathematics, and computer science.
Target Audience

This edited book on cryptography and IS will propose contributions on a wide range of topics on foundations and applications written by a selection of international experts. We aim to bring about a book covering the theory, practice, and tools of cryptography in producing secure IS. It will introduce fundamentals briefly but dwell on advanced topics at much greater length. As such it will serve the needs of advanced learners, faculty and graduate students alike, and should be suitable for practitioners, individual learners, and classroom adoption. The book will also serve as an important reference for developers of secure IS applications and industry practitioners.
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
? Cryptography
? Cryptography and Security
? Cryptography and Data Protection
? Cryptography and Privacy
? Cryptographic Protocols
? Cryptographic Solutions
? Copyright protection
? Agent & Multi-agent System Security
? Authentication & Authorization
? Engineering Secure Information Systems
? Forensics and Ethical Hacking
? Key Management
? Cryptography and Cryptanalysis
? Ontology of Cryptographic Solutions
? Public-key Crypto Systems
? Standards, guidelines and certification
Detailed IGI Book CfCP is available at http://bit.ly/seRo4t. Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.
Submission Procedure

Researchers and practitioners are invited to submit by January 20, 2012, a 2-3 page chapter proposal clearly explaining the contributions of the chapter and how it will address a cryptographic solution for IS. Authors of accepted proposals will be notified at the most in three weeks and sent chapter guidelines. Full chapters of about 20 pages are expected to be submitted by April 27, 2012. All the submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
All proposals must be submitted electronically via the Submission Site (https://cmt.research.microsoft.com/CRYPSIS2012/) by the due date.
Publisher

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information about the publisher, please visit www.igi-global.com. This book is planned to be released early in late 2013.
Important Dates

January 20, 2012: Final Proposal Submission Deadline
April 27, 2012: Full Chapter Submission
July 27, 2012: Review Results Returned
Aug 30, 2012: Revised Chapter Submission
Sep 30, 2012: Final Acceptance Notification
Oct 15, 2012: Final Chapter Submission
Contact Details

Inquiries may be forwarded by e-mail through the submission site, or directly addressed to the editors:
Atilla ELCI (Suleyman Demirel University, Turkey, atilla.elci-AT-gmail.com),
Josef PIEPRZYK (Macquarie University, Australia, josef.pieprzyk-AT-mq.edu.au),
Alexander CHEFRANOV (Eastern Mediterranean University, North Cyprus, alexander.chefranov-AT-emu.edu.tr),
Mehmet ORGUN (Macquarie University, Australia, mehmet.orgun-AT-mq.edu.au),
Huaxiong WANG (Nanyang Technological University, Singapore, hxwang-AT-ntu.edu.sg), and
Rajan SHANKARAN (Macquarie University, Australia, rajan.shankaran-AT-mq.edu.au).

:| Feeling better
Yeni yılınız kutlu olsun. / I wish you a happy new year.
Atilla Elci, Ph.D.
http://member.acm.org/~aelci
http://suleyman-demirel.academia.edu/AtillaElçi/
www.linkedin.com/profile/view?id=32895885&trk=tab_pro
IGI Book CfCP: http://bit.ly/seRo4t
http://www.intechweb.org/welcome/8a1290de1769ec93e...
ESAS 2012: http://compsac.cs.iastate.edu/workshop_details.php...
Wiley Conc & Comp'n SI CFP: http://tinyurl.com/Wiley-CC-SI
Springer Nw Sc SI CFP: http://tinyurl.com/Springer-NS-SI
COMPSAC 2012 CFP: www.compsac.org
SIN 2012 CFP: www.sinconf.org/sin2012/
CFP: Wiley SCN : http://tinyurl.com/SCN-SI-SINConf
Springer Book: http://tinyurl.com/ESAS-book

Last modified: 2012-01-12 20:09:46