Skip to main content.

ARCHITECTURES AND PROTOCOLS FOR SECURE INFORMATION TECHNOLOGY

CALL FOR FULL CHAPTER PROPOSALS

Book title: ARCHITECTURES AND PROTOCOLS FOR SECURE INFORMATION TECHNOLOGY
A book edited by Dr. Ruiz-Martínez, Dr. Pereñíguez-García and Dr. Marín-López (University of Murcia, Spain)
To be published by IGI Global: http://bit.ly/IIc6Up

^ TOP

Introduction

Information and Communications Technologies (ICT) have become pervasive and they are part of our life. We can exchange information through different ways of communication such as e-mail, instant messaging, audio/video conference, social networks, and Web sites, etc. Additionally, thanks to ICT, we are able to develop activities in ways previously unimaginable: collaborative working in places distributed over the world, making purchases, gambling, and managing our bank accounts, and performing a wide variety of electronic operations at home. In all these systems, security is an essential requirement demanded by both users and service providers in order to prevent attacks and misuses. The provision of security in ICT systems is a challenging issue which comprises the protection of both infrastructures offering services and exchanging information over communication networks. In particular, ICT security relies on two main building blocks for solving these kinds of problems: secure protocols which guarantee different security properties such as confidentiality, authentication, and non-repudiation, privacy, etc., and the definition of architectures that are composed of several elements intended to protect the information handled or exchanged, the access to the system, etc.

^ TOP

Objective of the Book

The aim of this book is to present recent contributions, advances, and trends related to these building blocks. To achieve this goal, the book aims to investigate not only the state of the art on different protocols and architectures that can be used to design, create, and develop security infrastructures, but also new protocols and architectures that can overcome the current problems that the solutions developed up to now are not able to manage. With this information, the reader is provided with the necessary knowledge for designing and establishing an information technology system, which risks are assumed, the requirements that should be considered, and the different elements that allow the establishment of the infrastructure in a secure way. Additionally, the deployment of the infrastructure also involves the choice of different secure protocols to use depending on the scenario. Hence, this book will also introduce the different protocols that could be used in these infrastructures to satisfy different security properties that vary depending on the scenario.

^ TOP

Target Audience

The target audience of this book will be composed of researchers who are in pursuit of exploring recent advances in ICT security, as well as engineers and professionals responsible for deploying and managing ICT systems. It will also provide a reference for teachers and students in various information technology-related programs (security, communications, e-commerce, e-business, etc.) programs.

^ TOP

Recommended topics include, but are not limited to, the following:

^ TOP

Submission Procedure

Researchers and practitioners are invited to submit on or before October 15 (extended), 2012 a full chapter. All submitted chapters will be reviewed on a double-blind review basis. It is also to be noted that contributors may also be requested to serve as reviewers for this project. The length of the paper should be 8,000 words at least including figures, tables and charts. In http://ants.inf.um.es/staff/arm/instructions-igi.zip you can find a copy of the “Details to Keep in Mind for Your Full Chapter Submission” and “Chapter Organization and Formatting” provided by the publisher (in the file that we attach you), IGI Global (www.igi-global.com). Please note there is also a chapter template available online at: http://www.igi-global.com/Files/AuthorEditor/extendedtemplate.doc. Your adherence to the guidelines provided in these documents is very important. Should you have any questions regarding your chapter, please do not hesitate to contact us.

^ TOP

Publisher

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit http://ww.igi-global.com. This publication is anticipated to be released in 2013.

^ TOP

Important Dates

October 15, 2012: Full Chapter Submission (extended)
November 15, 2012: Review Results Returned
December 15, 2012: Revised Chapter Submission
December 30, 2012: Final Acceptance Notifications
January 30, 2013: Final Chapter Submission

^ TOP

Editorial Advisory Board Members

Stefanos Gritzalis, University of the Aegean, Greece
Yoshihiro Ohba, Toshiba Corporate R&D, Japan
Lily Chen, National Institute of Standards and Technology (NIST), USA
Jong-Hyouk Lee, TELECOM Bretagne, France
Antonio Maña Gómez, University of Málaga, Spain
Georgios Kambourakis, University of the Aegean, Greece
Alper Yegin, Samsung Electronics, Turkey
Alejandro Pérez Mendez, University of Murcia, Spain
Sabu M. Thampi, Indian Institute of Information Technology and Management, India
Fernando Bernal Hidalgo, University of Murcia, Spain
Ashutosh Dutta, NIKSUN, USA

^ TOP

Inquiries

Inquiries and submissions can be forwarded electronically (Word document) or by mail to:
Dr. Antonio Ruiz-Martínez, Dr. Fernando Pereñíguez-García and Dr. Rafael Marín-López
Department of Information and Communications Engineering
E-30071, University of Murcia
Tel.: +868 88 78 82 -- Fax: +34 868 88 41 51
E-mail: {arm,pereniguez,rafa}@um.es

^ TOP

Latest Update: July, 26th 2012