Educause Security Discussion mailing list archives
CFC - Book in Enterprise IT Security : Invitation for chapter proposal
From: Djamel Khadraoui <djamel.khadraoui () TUDOR LU>
Date: Thu, 25 Aug 2005 14:51:42 +0200
CALL FOR CHAPTERS BOOK TITLE Advances in Enterprise Information Technology Security INTRODUCTION Information about customers, competitors, products and processes is a key issue for an enterprise’s success. Providing and maintaining consistent security of this information on servers and across networks must be one of the enterprise’s business activities. The book will provide a broad working knowledge of all the major security issues affecting today's enterprise IT activities, giving readers the tools to address opportunities in the field. This is mainly because the security factors provide the enterprise a high potential in order to provide trusted services to their customers. This book will show readers how to apply a number of security techniques to the enterprise environment with its complex and various applications. It covers the entire field of enterprise security, including: database security and integrity, security policies, computer and client/server systems, communication networks and multimedia, applications and operating system software, security of collaborative applications, enterprise security identity management, and enterprise security risk management. It will be an all-in-one reference for IT managers, researchers, application integrators, database and network administrators, graduate and postgraduate students, and software architects. BOOK TABLE OF CONTENTS Part 1: Communications and Multimedia - Web services security, - Information hiding, - Security architectures, - Firewalls and network security, - Mobile security, - e-commerce systems. Part 2: Trust and Privacy - Database security and integrity, - Security policies, - Security of collaborative applications (such as workflow systems), - Policy right management. Part 3: Authorization - Enterprise security identity management, - Key management, - Role based access control, - Secure transactions, - Global key infrastructures. Part 4: Risk Management - Malicious code, - Preventive security, - Digital right management, - Enterprise security risk management, - System and software life cycles security integration. OVERALL OBJECTIVES AND MISSION OF THE BOOK The focus is on IT security for the enterprise. It aims to be used as a desk reference because it will be a best collection of papers written by many authors instead of a book that focuses on a specific approach or methodology. The main motivation on this is that we are convinced that there are no simple and complete answers to the issues of security. We actually cannot think that the only security action to perform in order to secure the enterprise information systems is to install a firewall, improve their authentication method, or write a security policy. This should not be considered as a complete solution, though it will help in improving its security. The book chapters comprising this desk reference will be organized in logical groupings that are akin to appropriate levels in enterprise IT security. Each section of the actual book will be devoted to carefully chosen papers, some of which will reflect individual authors' experiences. The strength of this approach is that it gives a benefit from a rich diversity of viewpoints and deep subject matter knowledge. THE AUDIENCE OF THE BOOK IT Managers, application integrators, database and network administrators, graduate and postgraduate students, software architects, researchers. SUBMISSION PROCEDURE Researchers and practitioners are invited to submit on or before October 15, 2005, a 2-3 page manuscript proposal clearly explaining the mission and concerns of the proposed chapter. Authors of accepted proposal will be notified by October 31, 2005 about the status of their proposal and sent chapter organizationally guidelines. Full chapters must be submitted by January 31, 2006 via email to the editors. All submitted chapters will be double-blind reviewed and authors will be notified about needed revisions by March 31, 2006. The revised chapters are due by April 30, 2006. Authors will be informed about the final acceptance status by May 31, 2006. The final chapters, disks, and author biographies are due on June 30, 2006. The authors should provide the manuscript in electronic format in MS Word or RTF format and should be sent as an attachment via email to the following address: sec-book () univ-metz fr EDITORS Dr. Eng. Djamel KHADRAOUI (Centre Henri Tudor - Luxembourg) and Dr. Francine HERRMANN (University of Metz - France) PUBLISHER The book is scheduled to be published by Idea Group Inc., http://www.idea-group.com, publisher of the Idea Group Publishing, Information Science Publishing, IRM Press, CyberTech Publishing and Idea Group Reference imprints, in 2006.
Current thread:
- CFC - Book in Enterprise IT Security : Invitation for chapter proposal Djamel Khadraoui (Aug 25)