Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    CFC 2012 - Call For Chapters : Network Security Technologies: Design and Applications

    View: 719

    Website www.igi-global.com | Want to Edit it Edit Freely

    Category CFC 2012

    Deadline: April 27, 2012 | Date: November 30, 2012

    Venue/Country: Online, Online

    Updated: 2012-02-06 13:08:14 (GMT+9)

    Call For Papers - CFP

    Advances in telecommunications, IT technologies and emerging security challenges have produced a field?network security technologies?to deal with the art, the knowledge, methodologies and techniques from diverse areas including cryptography and network communication and protocols. As a field, network security technologies is devoted to solving security problems in a systematic way in order to ensure security of software and communication functionalities at basic, enhanced, integrated, and architectural levels.

    Objective of the Book

    This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in network security technologies. It will be written for professionals who want to improve their understanding of the strategic role of trust at different levels of the information and knowledge society, including trust at the level of the global economy, of networks and organizations, of teams and work groups, of information systems and, finally, trust at the level of individuals as actors in the networked environments.

    The book will cover the latest knowledge and technologies used and applied in network security. Also, it will analyze malicious threats, viruses, and attacks which can compromise network integrity at hardware or software levels.

    Target Audience

    The target audience of this book will be composed of professionals and researchers working in the field of information and knowledge management in various disciplines, e.g. library, information and communication sciences, administrative sciences and management, education, adult education, sociology, computer science, and information technology. Moreover, the book will provide insights and support to executives concerned with the management of expertise, knowledge, information and organizational development in different types of work communities and environments.

    Recommended topics include, but are not limited to, the following:

    Network and Wireless Network Security

    Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems

    Peer-to-Peer Network Security

    Database and System Security

    Intrusion Detection and Prevention

    Internet Security & Applications Security & Network Management

    E-mail security, Spam, Phishing, E-mail fraud

    Virus, worms, Trojan Protection

    Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)

    Ubiquitous Computing Security

    Web 2.0 security

    Cryptographic protocols

    Performance Evaluations of Protocols & Security Application

    Integrating security in Internet protocols: routing, naming, network management

    Security for Cloud Computing

    Security of Web-based applications and services

    Anti-malware techniques: detection, analysis, and prevention

    Security for future home networks, Internet of Things, body-area networks

    Intrusion prevention, detection, and response

    Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques

    Privacy and anonymity technologies

    Security for Vehicular Ad-hoc Networks (VANETs)

    Security for peer-to-peer and overlay network systems

    Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing

    Implementation, deployment and management of network security policies

    Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management

    Public key infrastructures, key management, certification, and revocation

    Special problems and case studies: e.g., trade-offs between security and efficiency, usability, reliability and cost

    Security for collaborative applications: teleconferencing and video-conferencing

    Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)

    Applying Trustworthy Computing mechanisms to secure network protocols and distributed systems

    Submission Procedure

    Researchers and practitioners are invited to submit on or before February 15, 2012, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by February 28, 2012 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by April 27, 2012. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

    Publisher

    This book is scheduled to be published in 2013 by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.

    Important Dates

    February 15, 2012: Proposal Submission Deadline

    February 28, 2012: Notification of Acceptance

    April 27, 2012: Full Chapter Submission

    July 27, 2012: Review Results Returned

    October 15, 2012: Final Chapter Submission

    November 30, 2012: Final Deadline

    Inquiries and submissions can be forwarded electronically (Word document):

    Dr. O. Ait Mohamed

    aitatece.concordia.ca

    http://www.igi-global.com/authorseditors/authoreditorresources/callforbookchapters/callforchapterdetails.aspx?callforcontentid=bfa951df-2f13-4ac8-825e-49f5545aedd3


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.