CFC 2012 - Call For Chapters : Network Security Technologies: Design and Applications
Topics/Call fo Papers
Advances in telecommunications, IT technologies and emerging security challenges have produced a field?network security technologies?to deal with the art, the knowledge, methodologies and techniques from diverse areas including cryptography and network communication and protocols. As a field, network security technologies is devoted to solving security problems in a systematic way in order to ensure security of software and communication functionalities at basic, enhanced, integrated, and architectural levels.
Objective of the Book
This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in network security technologies. It will be written for professionals who want to improve their understanding of the strategic role of trust at different levels of the information and knowledge society, including trust at the level of the global economy, of networks and organizations, of teams and work groups, of information systems and, finally, trust at the level of individuals as actors in the networked environments.
The book will cover the latest knowledge and technologies used and applied in network security. Also, it will analyze malicious threats, viruses, and attacks which can compromise network integrity at hardware or software levels.
Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of information and knowledge management in various disciplines, e.g. library, information and communication sciences, administrative sciences and management, education, adult education, sociology, computer science, and information technology. Moreover, the book will provide insights and support to executives concerned with the management of expertise, knowledge, information and organizational development in different types of work communities and environments.
Recommended topics include, but are not limited to, the following:
Network and Wireless Network Security
Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
Peer-to-Peer Network Security
Database and System Security
Intrusion Detection and Prevention
Internet Security & Applications Security & Network Management
E-mail security, Spam, Phishing, E-mail fraud
Virus, worms, Trojan Protection
Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
Ubiquitous Computing Security
Web 2.0 security
Cryptographic protocols
Performance Evaluations of Protocols & Security Application
Integrating security in Internet protocols: routing, naming, network management
Security for Cloud Computing
Security of Web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Security for future home networks, Internet of Things, body-area networks
Intrusion prevention, detection, and response
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Security for Vehicular Ad-hoc Networks (VANETs)
Security for peer-to-peer and overlay network systems
Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
Implementation, deployment and management of network security policies
Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
Public key infrastructures, key management, certification, and revocation
Special problems and case studies: e.g., trade-offs between security and efficiency, usability, reliability and cost
Security for collaborative applications: teleconferencing and video-conferencing
Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)
Applying Trustworthy Computing mechanisms to secure network protocols and distributed systems
Submission Procedure
Researchers and practitioners are invited to submit on or before February 15, 2012, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by February 28, 2012 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by April 27, 2012. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Publisher
This book is scheduled to be published in 2013 by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.
Important Dates
February 15, 2012: Proposal Submission Deadline
February 28, 2012: Notification of Acceptance
April 27, 2012: Full Chapter Submission
July 27, 2012: Review Results Returned
October 15, 2012: Final Chapter Submission
November 30, 2012: Final Deadline
Inquiries and submissions can be forwarded electronically (Word document):
Dr. O. Ait Mohamed
ait-AT-ece.concordia.ca
http://www.igi-global.com/authorseditors/authoredi...
Objective of the Book
This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in network security technologies. It will be written for professionals who want to improve their understanding of the strategic role of trust at different levels of the information and knowledge society, including trust at the level of the global economy, of networks and organizations, of teams and work groups, of information systems and, finally, trust at the level of individuals as actors in the networked environments.
The book will cover the latest knowledge and technologies used and applied in network security. Also, it will analyze malicious threats, viruses, and attacks which can compromise network integrity at hardware or software levels.
Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of information and knowledge management in various disciplines, e.g. library, information and communication sciences, administrative sciences and management, education, adult education, sociology, computer science, and information technology. Moreover, the book will provide insights and support to executives concerned with the management of expertise, knowledge, information and organizational development in different types of work communities and environments.
Recommended topics include, but are not limited to, the following:
Network and Wireless Network Security
Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
Peer-to-Peer Network Security
Database and System Security
Intrusion Detection and Prevention
Internet Security & Applications Security & Network Management
E-mail security, Spam, Phishing, E-mail fraud
Virus, worms, Trojan Protection
Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
Ubiquitous Computing Security
Web 2.0 security
Cryptographic protocols
Performance Evaluations of Protocols & Security Application
Integrating security in Internet protocols: routing, naming, network management
Security for Cloud Computing
Security of Web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Security for future home networks, Internet of Things, body-area networks
Intrusion prevention, detection, and response
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Security for Vehicular Ad-hoc Networks (VANETs)
Security for peer-to-peer and overlay network systems
Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
Implementation, deployment and management of network security policies
Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
Public key infrastructures, key management, certification, and revocation
Special problems and case studies: e.g., trade-offs between security and efficiency, usability, reliability and cost
Security for collaborative applications: teleconferencing and video-conferencing
Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)
Applying Trustworthy Computing mechanisms to secure network protocols and distributed systems
Submission Procedure
Researchers and practitioners are invited to submit on or before February 15, 2012, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by February 28, 2012 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by April 27, 2012. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Publisher
This book is scheduled to be published in 2013 by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.
Important Dates
February 15, 2012: Proposal Submission Deadline
February 28, 2012: Notification of Acceptance
April 27, 2012: Full Chapter Submission
July 27, 2012: Review Results Returned
October 15, 2012: Final Chapter Submission
November 30, 2012: Final Deadline
Inquiries and submissions can be forwarded electronically (Word document):
Dr. O. Ait Mohamed
ait-AT-ece.concordia.ca
http://www.igi-global.com/authorseditors/authoredi...
Other CFPs
Last modified: 2012-02-06 13:08:14