Increasingly, the global society is adapting to the computerized
information systems for all data and information transactions. People
tend to store all their personal, business and public information on
the web for enhanced storage, search and access. While society relies
on web and computerized information storage, attackers misuse the
technology and secure the sensitive information. To prevent such
attacks, information security researchers have developed mechanisms
and technology to protect data loss and intrusion. Intrusion and
prevention are on-going processes and technology development reflects
upon these operations. Users need to understand the data protection
mechanisms comprehensively. Comprehensive knowledge on information
security is required not only for researchers and practitioners, but
also for policy makers, system managers, owners and administrators.
The process of building and imparting information security knowledge
is possible through the creation of a comprehensive collection of
research on the topic.. Unfortunately, such a collection of research
on security does not exist. The forthcoming handbook on Information
Security will address significant issues in the field.
Submission and Review Process
Researchers and
practitioners are invited to submit a 2-5 page manuscript proposal
clearly explaining the objective and concerns of the proposed
chapter on or before June 10. Authors of accepted proposals will be
notified about the status of their proposals and sent chapter
organizational guidelines. Full chapters should be about
8,000-10,000 words in length and expected to be submitted by October
15, 2008.
All chapters will be subject to a double-blind peer review process.
The proposed handbook would address the following titles, but not limited.
Access Control
Accounting and Audit
Anonymity and Pseudonymity
Applied Cryptography
Application Security
Attacks and Prevention of Online Fraud
Authentication and Non-repudiation
Biometrics
Computer crimes
Content dependant access control
Cryptographic Protocols and Functions
Cyber attacks
Database Security
Data-loss prevention
Design and Analysis of Cryptographic Algorithms
Digital Certificates
Digital Rights Management
Economics of Security and Privacy
Email Security
Encryption standards
Firewall Management
Formal Methods in Security
Foundations of Computer Security
GSM/3G Devices
Identity and Trust Management
Image-based spams
Information Hiding and Watermarking
Infrastructure Security
Information Phising
Information Security Training
Insiders Threat Management
Intrusion Detection, Tolerance and Prevention |
Mobile, Ad Hoc and Sensor Network Security
Network and Wireless Network Security
Peer-to-Peer Network Security
PKI and PMI
Private Searches
Instant Message Security
Integrated Trust Management
Malware
Patch Management
Risk Management
Role Based Access Control Models
Security Audit
Security and Ontology
Security Architectures
Security Intelligence
Security and Privacy in Pervasive/Ubiquitous Computing
Security in Information Flow
Security for Mobile Code
Security of Grid Computing
Security of eCommerce, eBusiness and eGovernment
Security Toolkit
Security Modeling and Architectures
Security Models for Ambient Intelligence environments
Security Policies and Standards
Spyware
SSL Technology
Storage Security
Trusted Computing
Usable Security
Virus Protection
Vulnerability Assessment Management
Wireless network security |
Important Dates
|
Submission of Proposals: |
5 July 2008 |
|
Selection of Proposals: |
30 July 2008 |
|
Preliminary review and revision: |
15 August 2008 |
|
Second Review and Revision: |
30 Aug 2008 |
|
Camera ready chapters: |
15 Oct 2008 |
For proposal submission click here
Download sample chapter
click here
Editor: Pit Pichappan
Professor
Faculty of Computer and Information Sciencesv
AISB University
Riyadh
Saudi Arabia
Editor-in-chief
Journal of Digital Information Management
http://www.dirf.org/jdim Email: ppichappan@gmail.com , pichappan@dirf.org
|