ARCHITECTURES AND PROTOCOLS FOR SECURE INFORMATION TECHNOLOGY
CALL FOR FULL CHAPTER PROPOSALS
Book title: ARCHITECTURES AND PROTOCOLS FOR SECURE INFORMATION TECHNOLOGY
A book edited by Dr. Ruiz-Martínez, Dr. Pereñíguez-García and Dr. Marín-López (University of Murcia, Spain)
To be published by IGI Global: http://bit.ly/IIc6Up
Introduction
Information and Communications Technologies (ICT) have become pervasive and they are part of our life. We can exchange information through different ways of communication such as e-mail, instant messaging, audio/video conference, social networks, and Web sites, etc. Additionally, thanks to ICT, we are able to develop activities in ways previously unimaginable: collaborative working in places distributed over the world, making purchases, gambling, and managing our bank accounts, and performing a wide variety of electronic operations at home. In all these systems, security is an essential requirement demanded by both users and service providers in order to prevent attacks and misuses. The provision of security in ICT systems is a challenging issue which comprises the protection of both infrastructures offering services and exchanging information over communication networks. In particular, ICT security relies on two main building blocks for solving these kinds of problems: secure protocols which guarantee different security properties such as confidentiality, authentication, and non-repudiation, privacy, etc., and the definition of architectures that are composed of several elements intended to protect the information handled or exchanged, the access to the system, etc.
^ TOPObjective of the Book
The aim of this book is to present recent contributions, advances, and trends related to these building blocks. To achieve this goal, the book aims to investigate not only the state of the art on different protocols and architectures that can be used to design, create, and develop security infrastructures, but also new protocols and architectures that can overcome the current problems that the solutions developed up to now are not able to manage. With this information, the reader is provided with the necessary knowledge for designing and establishing an information technology system, which risks are assumed, the requirements that should be considered, and the different elements that allow the establishment of the infrastructure in a secure way. Additionally, the deployment of the infrastructure also involves the choice of different secure protocols to use depending on the scenario. Hence, this book will also introduce the different protocols that could be used in these infrastructures to satisfy different security properties that vary depending on the scenario.
^ TOPTarget Audience
The target audience of this book will be composed of researchers who are in pursuit of exploring recent advances in ICT security, as well as engineers and professionals responsible for deploying and managing ICT systems. It will also provide a reference for teachers and students in various information technology-related programs (security, communications, e-commerce, e-business, etc.) programs.
^ TOPRecommended topics include, but are not limited to, the following:
- Analysis of secure protocols and architectures
- Advances and trends in secure standard protocols such as TLS, Kerberos, etc.
- Analysis of secure protocols in different scenarios.
- Comparative or survey of secure protocols for a specific purpose: authentication, non-repudiation, (mobile) payments, etc.
- Security modelling and vulnerability analysis.
- New techniques for formal or automated validation of protocols and validation of specific protocols.
- Analysis of different security-related issues such as performance, traffic and usability.
- Analysis of security architectures in different scenarios: e-commerce, e-government, etc.
- New secure protocols, architectures or systems for:
- Exchange of information or keying material.
- Authentication.
- Intrusion detection.
- Access control.
- Content distribution.
- Anonymous communications and services.
- Billing, accounting and charging.
- E-commerce, e-business and e-government.
- NGN and IMS.
- Mobile/Embedded systems security and forensics.
- Emerging scenarios such as vehicular communications, Internet of things, cloud computing, location-based services identity. management, NFC, RFID, trusted computing, SOA, P2P services, multimedia communications, etc.
Submission Procedure
Researchers and practitioners are invited to submit on or before October 15 (extended), 2012 a full chapter. All submitted chapters will be reviewed on a double-blind review basis. It is also to be noted that contributors may also be requested to serve as reviewers for this project. The length of the paper should be 8,000 words at least including figures, tables and charts. In http://ants.inf.um.es/staff/arm/instructions-igi.zip you can find a copy of the “Details to Keep in Mind for Your Full Chapter Submission” and “Chapter Organization and Formatting” provided by the publisher (in the file that we attach you), IGI Global (www.igi-global.com). Please note there is also a chapter template available online at: http://www.igi-global.com/Files/AuthorEditor/extendedtemplate.doc. Your adherence to the guidelines provided in these documents is very important. Should you have any questions regarding your chapter, please do not hesitate to contact us.
^ TOPPublisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit http://ww.igi-global.com. This publication is anticipated to be released in 2013.
^ TOPImportant Dates
October 15, 2012: Full Chapter Submission (extended) November 15, 2012: Review Results Returned December 15, 2012: Revised Chapter Submission December 30, 2012: Final Acceptance Notifications January 30, 2013: Final Chapter Submission
^ TOPEditorial Advisory Board Members
Stefanos Gritzalis, University of the Aegean, Greece Yoshihiro Ohba, Toshiba Corporate R&D, Japan Lily Chen, National Institute of Standards and Technology (NIST), USA Jong-Hyouk Lee, TELECOM Bretagne, France Antonio Maña Gómez, University of Málaga, Spain Georgios Kambourakis, University of the Aegean, Greece Alper Yegin, Samsung Electronics, Turkey Alejandro Pérez Mendez, University of Murcia, Spain Sabu M. Thampi, Indian Institute of Information Technology and Management, India Fernando Bernal Hidalgo, University of Murcia, Spain Ashutosh Dutta, NIKSUN, USA
^ TOPInquiries
Inquiries and submissions can be forwarded electronically (Word document) or by mail to: Dr. Antonio Ruiz-Martínez, Dr. Fernando Pereñíguez-García and Dr. Rafael Marín-López Department of Information and Communications Engineering E-30071, University of Murcia Tel.: +868 88 78 82 -- Fax: +34 868 88 41 51 E-mail: {arm,pereniguez,rafa}@um.es
Latest Update: July, 26th 2012