[ecoop-info] Deadline extension: Call for Full Chapters proposals: Architectures and Protocols for Secure Information Technology

Antonio Ruiz Martínez arm at um.es
Sun Sep 30 11:44:30 CEST 2012


Architectures and Protocols for Secure Information Technology
A book edited by Dr. Ruiz-Martínez, Dr. Pereñíguez-García and Dr.
Marín-López (University of Murcia, Spain)

To be published by IGI Global:  http://bit.ly/IIc6Up

Information and Communications Technologies (ICT) have become pervasive
and they are part of our life. We can exchange information through
different ways of communication such as e-mail, instant messaging,
audio/video conference, social networks, and Web sites, etc.
Additionally, thanks to ICT, we are able to develop activities in ways
previously unimaginable: collaborative working in places distributed
over the world, making purchases, gambling, and managing our bank
accounts, and performing a wide variety of electronic operations at
home. In all these systems, security is an essential requirement
demanded by both users and service providers in order to prevent attacks
and misuses. The provision of security in ICT systems is a challenging
issue which comprises the protection of both infrastructures offering
services and exchanging information over communication networks. In
particular, ICT security relies on two main building blocks for solving
these kinds of problems: secure protocols which guarantee different
security properties such as confidentiality, authentication, and
non-repudiation, privacy, etc., and the definition of architectures that
are composed of several elements intended to protect the information
handled or exchanged, the access to the system, etc.

Objective of the Book
The aim of this book is to present recent contributions, advances, and
trends related to these building blocks. To achieve this goal, the book
aims to investigate not only the state of the art on different protocols
and architectures that can be used to design, create, and develop
security infrastructures, but also new protocols and architectures that
can overcome the current problems that the solutions developed up to now
are not able to manage. With this information, the reader is provided
with the necessary knowledge for designing and establishing an
information technology system, which risks are assumed, the requirements
that should be considered, and the different elements that allow the
establishment of the infrastructure in a secure way. Additionally, the
deployment of the infrastructure also involves the choice of different
secure protocols to use depending on the scenario. Hence, this book will
also introduce the different protocols that could be used in these
infrastructures to satisfy different security properties that vary
depending on the scenario.

Target Audience
The target audience of this book will be composed of researchers who are
in pursuit of exploring recent advances in ICT security, as well as
engineers and professionals responsible for deploying and managing ICT
systems. It will also provide a reference for teachers and students in
various information technology-related programs (security,
communications, e-commerce, e-business, etc.) programs.

Recommended topics include, but are not limited to, the following:
• Analysis of secure protocols and architectures
     o Advances and trends in secure standard protocols such as TLS,
Kerberos, etc.
      o Analysis of secure protocols in different scenarios.
      o Comparative or survey of secure protocols for a specific purpose:
    authentication, non-repudiation, (mobile) payments, etc.
      o Security modelling and vulnerability analysis.
      o New techniques for formal or automated validation of protocols and
validation of specific protocols.
      o Analysis of different security-related issues such as performance,
traffic and usability.
      o Analysis of security architectures in different scenarios:
e-commerce, e-government, etc.
• New secure protocols, architectures or systems for:
      o Exchange of information or keying material.
      o Authentication.
      o Intrusion detection.
      o Access control.
      o Content distribution.
      o Anonymous communications and services.
      o Billing, accounting and charging.
      o E-commerce, e-business and e-government.
      o NGN and IMS.
      o Mobile/Embedded systems security and forensics.
      o Emerging  scenarios such as vehicular communications, Internet of
things, cloud computing, location-based services identity. management,
NFC, RFID, trusted computing, SOA, P2P services, multimedia
communications, etc.

Submission Procedure
Researchers and practitioners are invited to submit on or before
September 30, 2012 a full chapter. All submitted chapters will be
reviewed on a double-blind review basis. It is also to be noted that
contributors may also be requested to serve as reviewers for this
project. The length of the paper should be 8,000 words at
least including figures, tables and charts.

In http://ants.inf.um.es/staff/arm/instructions-igi.zip you can find a
copy of the “Details to Keep in Mind for Your Full Chapter Submission”

and “Chapter Organization and Formatting” provided by the publisher (in
the file that we attach you), IGI Global (www.igi-global.com). Please
note there is also a chapter template available online at:
http://www.igi-global.com/Files/AuthorEditor/extendedtemplate.doc. Your
adherence to the guidelines provided in these documents is very	
important. Should you have any questions regarding your
chapter, please do not hesitate to contact us.

More information can be found in the following web site:

This book is scheduled to be published by IGI Global (formerly Idea
Group Inc.), publisher of the “Information Science Reference” (formerly
Idea Group Reference), “Medical Information Science Reference,”
“Business Science Reference,” and “Engineering Science Reference”
imprints. For additional information regarding the publisher, please
visit http://ww.igi-global.com. This publication is anticipated to be
released in 2013.

Important Dates
October 15, 2012:	Full Chapter Submission (extended)
November 15, 2012:	Review Results Returned
December 15, 2012:	Revised Chapter Submission
December 30, 2012:	Final Acceptance Notifications
January 30, 2013:	Final Chapter Submission

Editorial Advisory Board Members:
Stefanos Gritzalis, University of the Aegean, Greece
Yoshihiro Ohba, Toshiba Corporate R&D, Japan
Lily Chen, National Institute of Standards and Technology (NIST), USA
Jong-Hyouk Lee, TELECOM Bretagne, France
Antonio Maña Gómez, University of Málaga, Spain
Georgios Kambourakis, University of the Aegean, Greece
Alper Yegin, Samsung Electronics, Turkey
Alejandro Pérez Mendez, University of Murcia, Spain
Sabu M. Thampi, Indian Institute of Information Technology and
Management, India
Fernando Bernal Hidalgo, University of Murcia, Spain

Inquiries and submissions can be forwarded electronically (Word
document) or by mail to:
Dr. Antonio Ruiz-Martínez, Dr. Fernando Pereñíguez-García and
Dr. Rafael Marín-López
Department of Information and Communications Engineering
E-30071, University of Murcia
Tel.: +868 88 78 82 • Fax: +34 868 88 41 51
E-mail: {arm,pereniguez,rafa}@um.es

Antonio Ruiz Martínez, PhD
Department of Information and Communications Engineering
Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
http://ants.inf.um.es/~arm/ or http://webs.um.es/arm/
e-mail: arm at um.es or arm [at] um [dot] es

More information about the ecoop-info mailing list