[PET] Call for Chapters proposals: Architectures and Protocols for Secure Information Technology

Antonio Ruiz Martínez arm at um.es
Mon May 21 13:21:59 BST 2012


CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: June 15, 2012
Architectures and Protocols for Secure Information Technology
A book edited by Dr. Ruiz-Martínez, Dr. Pereñíguez-García and Dr.
Marín-López (University of Murcia, Spain)

To be published by IGI Global:  http://bit.ly/IIc6Up


Introduction
Information and Communications Technologies (ICT) have become pervasive
and they are part of our life. We can exchange information through
different ways of communication such as e-mail, instant messaging,
audio/video conference, social networks, and Web sites, etc.
Additionally, thanks to ICT, we are able to develop activities in ways
previously unimaginable: collaborative working in places distributed
over the world, making purchases, gambling, and managing our bank
accounts, and performing a wide variety of electronic operations at
home. In all these systems, security is an essential requirement
demanded by both users and service providers in order to prevent attacks
and misuses. The provision of security in ICT systems is a challenging
issue which comprises the protection of both infrastructures offering
services and exchanging information over communication networks. In
particular, ICT security relies on two main building blocks for solving
these kinds of problems: secure protocols which guarantee different
security properties such as confidentiality, authentication, and
non-repudiation, privacy, etc., and the definition of architectures that
are composed of several elements intended to protect the information
handled or exchanged, the access to the system, etc.


Objective of the Book
The aim of this book is to present recent contributions, advances, and
trends related to these building blocks. To achieve this goal, the book
aims to investigate not only the state of the art on different protocols
and architectures that can be used to design, create, and develop
security infrastructures, but also new protocols and architectures that
can overcome the current problems that the solutions developed up to now
are not able to manage. With this information, the reader is provided
with the necessary knowledge for designing and establishing an
information technology system, which risks are assumed, the requirements
that should be considered, and the different elements that allow the
establishment of the infrastructure in a secure way. Additionally, the
deployment of the infrastructure also involves the choice of different
secure protocols to use depending on the scenario. Hence, this book will
also introduce the different protocols that could be used in these
infrastructures to satisfy different security properties that vary
depending on the scenario.


Target Audience
The target audience of this book will be composed of researchers who are
in pursuit of exploring recent advances in ICT security, as well as
engineers and professionals responsible for deploying and managing ICT
systems. It will also provide a reference for teachers and students in
various information technology-related programs (security,
communications, e-commerce, e-business, etc.) programs.

Recommended topics include, but are not limited to, the following:
• Analysis of secure protocols and architectures
   o Advances and trends in secure standard protocols such as TLS,
Kerberos, etc.
    o Analysis of secure protocols in different scenarios.
    o Comparative or survey of secure protocols for a specific purpose:
  authentication, non-repudiation, (mobile) payments, etc.
    o Security modelling and vulnerability analysis.
    o New techniques for formal or automated validation of protocols and
validation of specific protocols.
    o Analysis of different security-related issues such as performance,
traffic and usability.
    o Analysis of security architectures in different scenarios:
e-commerce, e-government, etc.
• New secure protocols, architectures or systems for:
    o Exchange of information or keying material.
    o Authentication.
    o Intrusion detection.
    o Access control.
    o Content distribution.
    o Anonymous communications and services.
    o Billing, accounting and charging.
    o E-commerce, e-business and e-government.
    o NGN and IMS.
    o Mobile/Embedded systems security and forensics.
    o Emerging  scenarios such as vehicular communications, Internet of
things, cloud computing, location-based services identity. management,
NFC, RFID, trusted computing, SOA, P2P services, multimedia
communications, etc.


Submission Procedure
Researchers and practitioners are invited to submit on or before June
15, 2012, a 2-3 page chapter proposal clearly explaining the mission and
concerns of his or her proposed chapter. Authors of accepted proposals
will be notified by July 15, 2012 about the status of their proposals
and sent chapter guidelines. Full chapters are expected to be submitted
by September 30, 2012. All submitted chapters will be reviewed on a
double-blind review basis. It is also to be noted that contributors may
also be requested to serve as reviewers for this project. More
information can be found in the following web site:
http://ants.inf.um.es/staff/arm/cfc-igi.html


Publisher
This book is scheduled to be published by IGI Global (formerly Idea
Group Inc.), publisher of the “Information Science Reference” (formerly
Idea Group Reference), “Medical Information Science Reference,”
“Business Science Reference,” and “Engineering Science Reference”
imprints. For additional information regarding the publisher, please
visit http://ww.igi-global.com. This publication is anticipated to be
released in 2013.


Important Dates
June 15, 2012:		Proposal Submission Deadline
July 15, 2012:		Notification of Acceptance
September 30, 2012:	Full Chapter Submission
November 15, 2012:	Review Results Returned
December 15, 2012:	Revised Chapter Submission
December 30, 2012:	Final Acceptance Notifications
January 30, 2013:	Final Chapter Submission


Editorial Advisory Board Members:
Stefanos Gritzalis, University of the Aegean, Greece
Yoshihiro Ohba, Toshiba Corporate R&D, Japan
Lily Chen, National Institute of Standards and Technology (NIST), USA
Jong-Hyouk Lee, TELECOM Bretagne, France
Antonio Maña Gómez, University of Málaga, Spain
Georgios Kambourakis, University of the Aegean, Greece
Alper Yegin, Samsung Electronics, Turkey
Alejandro Pérez Mendez, University of Murcia, Spain
Sabu M. Thampi, Indian Institute of Information Technology and
Management, India
Fernando Bernal Hidalgo, University of Murcia, Spain


Inquiries and submissions can be forwarded electronically (Word
document) or by mail to:
Dr. Antonio Ruiz-Martínez, Dr. Fernando Pereñíguez-García and
Dr. Rafael Marín-López
Department of Information and Communications Engineering
E-30071, University of Murcia
Tel.: +868 88 78 82 • Fax: +34 868 88 41 51
E-mail: {arm,pereniguez,rafa}@um.es


-- 
--------------------------------------------------------
Antonio Ruiz Martínez, PhD
Department of Information and Communications Engineering
Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
http://ants.inf.um.es/~arm/ or http://webs.um.es/arm/
e-mail: arm at um.es or arm [at] um [dot] es
--------------------------------------------------------


More information about the PET mailing list