Educause Security Discussion mailing list archives

CFC - Book in Enterprise IT Security : Invitation for chapter proposal


From: Djamel Khadraoui <djamel.khadraoui () TUDOR LU>
Date: Thu, 25 Aug 2005 14:51:42 +0200

CALL FOR CHAPTERS

BOOK TITLE
Advances in Enterprise Information Technology Security

INTRODUCTION
Information about customers, competitors, products and processes is a key
issue for an enterprise’s success. Providing and maintaining consistent
security of this information on servers and across networks must be one of
the enterprise’s business activities. The book will provide a broad 
working
knowledge of all the major security issues affecting today's enterprise IT
activities, giving readers the tools to address opportunities in the 
field.
This is mainly because the security factors provide the enterprise a high
potential in order to provide trusted services to their customers. This
book will show readers how to apply a number of security techniques to the
enterprise environment with its complex and various applications. It 
covers
the entire field of enterprise security, including: database security and
integrity, security policies, computer and client/server systems,
communication networks and multimedia, applications and operating system
software, security of collaborative applications, enterprise security
identity management, and enterprise security risk management. It will be 
an
all-in-one reference for IT managers, researchers, application 
integrators,
database and network administrators, graduate and postgraduate students,
and software architects.

BOOK TABLE OF CONTENTS
Part 1: Communications and Multimedia
- Web services security,
- Information hiding,
- Security architectures,
- Firewalls and network security,
- Mobile security,
- e-commerce systems.

Part 2: Trust and Privacy
- Database security and integrity,
- Security policies,
- Security of collaborative applications (such as workflow systems),
- Policy right management.

Part 3: Authorization
- Enterprise security identity management,
- Key management,
- Role based access control,
- Secure transactions,
- Global key infrastructures.

Part 4: Risk Management
- Malicious code,
- Preventive security,
- Digital right management,
- Enterprise security risk management,
- System and software life cycles security integration.

OVERALL OBJECTIVES AND MISSION OF THE BOOK
The focus is on IT security for the enterprise. It aims to be used as a
desk reference because it will be a best collection of papers written by
many authors instead of a book that focuses on a specific approach or
methodology. The main motivation on this is that we are convinced that
there are no simple and complete answers to the issues of security. We
actually cannot think that the only security action to perform in order to
secure the enterprise information systems is to install a firewall, 
improve
their authentication method, or write a security policy. This should not 
be
considered as a complete solution, though it will help in improving its
security.
The book chapters comprising this desk reference will be organized in
logical groupings that are akin to appropriate levels in enterprise IT
security. Each section of the actual book will be devoted to carefully
chosen papers, some of which will reflect individual authors' experiences.
The strength of this approach is that it gives a benefit from a rich
diversity of viewpoints and deep subject matter knowledge.

THE AUDIENCE OF THE BOOK
IT Managers, application integrators, database and network administrators,
graduate and postgraduate students, software architects, researchers.

SUBMISSION PROCEDURE
Researchers and practitioners are invited to submit on or before October
15, 2005, a 2-3 page manuscript proposal clearly explaining the mission 
and
concerns of the proposed chapter. Authors of accepted proposal will be
notified by October 31, 2005 about the status of their proposal and sent
chapter organizationally guidelines. Full chapters must be submitted by
January 31, 2006 via email to the editors. All submitted chapters will be
double-blind reviewed and authors will be notified about needed revisions
by March 31, 2006. The revised chapters are due by April 30, 2006. Authors
will be informed about the final acceptance status by May 31, 2006. The
final chapters, disks, and author biographies are due on June 30, 2006.
The authors should provide the manuscript in electronic format in MS Word
or RTF format and should be sent as an attachment via email to the
following address:
sec-book () univ-metz fr

EDITORS
Dr. Eng. Djamel KHADRAOUI (Centre Henri Tudor - Luxembourg) and Dr.
Francine HERRMANN (University of Metz - France)

PUBLISHER
The book is scheduled to be published by Idea Group Inc.,
http://www.idea-group.com,  publisher of the Idea Group Publishing,
Information Science Publishing, IRM Press, CyberTech Publishing and Idea
Group Reference imprints, in 2006. 

Current thread: