Personal tools
You are here: Home Members pichappan Handbook of Research on Threat Management and
Document Actions

Handbook of Research on Threat Management and

by Pit Pichappan last modified 2008-04-28 10:11

Call for Chapter Proposal Handbook of Research on Threat Management and Information Security: Models for Countering Attacks, Breaches and Intrusions. Publishers: IGI Global - (Disseminator of Knowledge Since 1988) (formerly "Idea Group Inc.") 701 E. Chocolate Avenue., Suite 200 Hershey, Pennsylvania 17033, USA http://www.dirf.org/security

Call for Chapter Proposal

Handbook of Research on Threat Management and
Information Security: Models for Countering Attacks, Breaches and
Intrusions.

Publishers: IGI Global - (Disseminator of Knowledge Since 1988)
(formerly "Idea Group Inc.")
701 E. Chocolate Avenue., Suite 200
Hershey, Pennsylvania 17033, USA

http://www.dirf.org/security

Increasingly, the global society is adapting to the computerized information systems for all data and information transactions. People tend to store all their personal, business and public information on the web for enhanced storage, search and access. While society relies on web and computerized information storage, attackers misuse the technology and secure the sensitive information. To prevent such attacks, information security researchers have developed mechanisms and technology to protect data loss and intrusion. Intrusion and prevention are on-going processes and technology development reflects upon these operations. Users need to understand the data protection mechanisms comprehensively. Comprehensive knowledge on information security is required not only for researchers and practitioners, but also for policy makers, system managers, owners and administrators. The process of building and imparting information security knowledge is possible through the creation of a comprehensive collection of research on the topic.. Unfortunately, such a collection of research on security does not exist. The forthcoming handbook on Information Security will address significant issues in the field.

Submission and Review Process

Researchers and practitioners are invited to submit a 2-5 page manuscript proposal clearly explaining the objective and concerns of the proposed chapter on or before May 15. Authors of accepted proposals will be notified about the status of their proposals and sent chapter organizational guidelines. Full chapters should be about 8,000-10,000 words in length and expected to be submitted by September 30, 2008.

All chapters will be subject to a double-blind peer review process.

The proposed handbook would address the following titles, but not limited.

Access Control
Accounting and Audit
Anonymity and Pseudonymity
Applied Cryptography
Application Security
Attacks and Prevention of Online Fraud
Authentication and Non-repudiation
Biometrics
Computer crimes
Content dependant access control
Cryptographic Protocols and Functions
Cyber attacks
Database Security
Data-loss prevention
Design and Analysis of Cryptographic Algorithms
Digital Certificates
Digital Rights Management
Economics of Security and Privacy
Email Security
Encryption standards
Firewall Management
Formal Methods in Security
Foundations of Computer Security
GSM/3G Devices
Identity and Trust Management
Image-based spams
Information Hiding and Watermarking
Infrastructure Security
Information Phising
Information Security Training
Insiders Threat Management
Intrusion Detection, Tolerance and
Prevention Mobile, Ad Hoc and Sensor Network Security
Network and Wireless Network Security
Peer-to-Peer Network Security
PKI and PMI
Private Searches
Instant Message Security
Integrated Trust Management
Malware
Patch Management
Risk Management
Role Based Access Control Models
Security Audit
Security and Ontology
Security Architectures
Security Intelligence
Security and Privacy in Pervasive/Ubiquitous
Computing
Security in Information Flow
Security for Mobile Code
Security of Grid Computing
Security of eCommerce, eBusiness and
eGovernment
Security Toolkit
Security Modeling and Architectures
Security Models for Ambient Intelligence
environments
Security Policies and Standards
Spyware
SSL Technology
Storage Security
Trusted Computing
Usable Security
Virus Protection
Vulnerability Assessment Management
Wireless network security

Submission at
http://www.dirf.org/security

Important Dates
Submission of Proposals:15 May 2008
Selection of Proposals:31 May 2008
Preliminary review and revision:15 June 2008
Second Review and Revision: 1 Aug 2008
Camera ready chapters: 15 Oct 2008

Editor: Pit Pichappan
Faculty of Computer and Information Sciences
Al Imam Saad Bin University
Riyadh. Saudi Arabia
Email: [email protected] , [email protected]
-----------------------------------------------------------------------------