Call For Book Chapters


William McQuay and Waleed W. Smari


Security in Computing and Networking Systems: The State-of-the-Art

Topics include (but are not limited to):

Foundations of Security in Computing Systems
  º   Authorization and Access Control   º   Biometrics, Authentication and Identity Management
  º   Cryptography and Secure Communications   º   Evaluation, Testing, and Anti Tampering Measures
  º   Forensics, Recovery and Healing   º   Grand Challenges in Security
  º   Intrusion Detection and Prevention   º   Principles for Designing Secure Computing Systems
  º   Proof and Verification of Network Protocols   º   Security Management, Monitoring, and Measurements
  º   Security Overview, Understanding the "Enemy" and the "Defenses"   º   Security Phases, Level Criteria and Non-repudiation
  º   Verification and Validation Methods and Tools for Secure Systems    

Methodologies and Algorithms
  º   Agent Based Security   º   Formal Methods
  º   Soft Computing Based security   º   Visualizing Security

Security in Computing and Networking Systems
  º   Autonomic Security   º   Context and Situation Aware Security
  º   e-Commerce and Enterprise Security   º   Human-Centered Security
  º   Internet Security   º   Network Security
  º   Security and Privacy   º   Security in Ad Hoc and sensor Networks
  º   Security in Collaboration Computing Systems   º   Security in Grid and Cluster Computing Systems
  º   Security in Knowledge Management and Decision Making Systems   º   Security in Mobile Computing Systems
  º   Security in Pervasive Computing Systems   º   Trust Management and Security
  º   Web and Web Services Security    



Authors Intention to Contribute:  by October 5, 2008

(with a chapter abstract and a tentative outline, and a bio with contact info in word/pdf format)

Proposal Acceptance Notification:  by March 30, 2009


Extended Chapter Submission by   December 20, 2009
Notification of Reviews by December 30, 2010
Camera-ready Chapter Submission by February 20, 2011


TBA.  Pending--Major publishers are under consideration.

    Spring of 2011


Security in computing and information systems has evolved at a rapid pace in the past two decades.  Technology has gone through tremendous changes in terms of security, access techniques, protocols and standards, bandwidth usage and also the wide range of applications in all domains.  Advances made as well as complexity have increased due to the introduction of different access technologies and tools, available services and models, and many other aspects during this evolution.  Yet, this progress is accompanied by more vulnerabilities, higher risks, increasing threats and sophisticated attacks.  Due to the ubiquitous and pervasive nature of newly developed systems, there are new concerns related to intellectual property, privacy, and social impact.  Users need to understand the data and systems protection mechanisms thoroughly.  Comprehensive knowledge of information security in computing systems is required not only for researchers and practitioners, but also for policy makers, system managers, owners and administrators.

Now we are discussing next generation systems.  Research, standardization and development of these systems will thus become more intense than before.  Thus this is the perfect timing to assess and understand the progress made and where we stand, and identify the research topics, gaps and challenges facing next generation systems.  Newly developed complex and seamlessly integrated systems, enhanced internetworking and high mobility will lead to added system requirements that are far more challenging than what we have seen in current ones.  As the NG systems provide many new service applications, security and privacy will become ones of the key issues to consider.  Hence, we have to start with security as an important aspect from the beginning.  Having security from the beginning will lead the researchers to develop realistic and effective NG solutions.  We believe that future security solutions should identify what is critical to protect and reduce the overall IT system susceptibility.  They should make the remaining critical system elements inaccessible to threats and shrink threat capability through the use of autonomic, tamper resistant, and detect and react security elements.  Such solutions will require a wide range of knowledge and familiarity with technologies in many domains.

The process of building and imparting information security knowledge is possible through the creation of a comprehensive collection of research on the topic.  Unfortunately, such a collection of research on security does not exist.  The forthcoming book on Security in Computing and Networking Systems will address significant issues in the field.  It is devoted to putting together all the latest developments and rigorous studies of the foundations of Security in these systems so that new breakthroughs and directions can be fostered.


The objective of the book is to bring a comprehensive view of the most important and recent advances in methodologies, models, tools and techniques for securing computing and network-based systems.

A careful selection of the chapters will be made, on the one hand, to cover a broad spectrum of issues and applications while keeping a reasonable trade-off between theoretical and practical issues, and, on the other, to achieve as much as possible a self-contained book that provides the reader with an up-to-date fundamental information on the subject matter that can be valuable to use and reference for years to come.

The intent for each chapter is to bring in a thorough treatment and analysis of the area it covers.  Taxonomies, comparisons, assessments and trends are particularly sought.  The chapter is not intended to present a solution to a problem, an algorithm, or a new tool.  Rather, it is meant to be a comprehensive text and reference on the respective topic.

The book’s aim is to provide a comprehensive guide that captures the state-of-the art in security of computing systems.  It will also identify potential research directions and technologies that will drive innovation within this domain.  It is primarily intended for scientists, educators, professionals and consultants in touch with research and strategic management of security in IT and computing and networking systems.  The book can be utilized in advanced courses or graduate programs (mostly in computer science, computer engineering, applied informatics or management information systems), also as supplements to course materials on security and information assurance.  It will serve as an addition to library reference sections and to the lay public following trends in computing and technology.


Researchers and practitioners are invited to submit a 3-5 page manuscript proposal (a title, author(s) and affiliation, an abstract, a tentative outline, anticipated number of pages of the final manuscript, and brief biography of authors) clearly explaining the objective, scope and concerns of the proposed chapter on or before October 5, 2008.  Topics listed above are good chapter subjects.  Authors of accepted proposals will be notified about the status of their proposals and sent chapter organizational guidelines by March 30, 2009.  Full chapters should be about 20-25 pages (single space format) in length and expected to be submitted by December 20, 2009.  The final camera-ready manuscript will be due February 20, 2011.

All chapters will be subject to a thorough double-blind peer review process by at least three reviewers.  Therefore, the manuscript should be anonymous without author(s), affiliations, acknowledgements, nor obvious references.

Manuscripts submitted to this edited volume will be considered for publication with the understanding that the same work has never been published and is not under any consideration for publication elsewhere.  Submission of a chapter for review would imply the commitment of the author(s) to publish the chapter in this book.  Early submission is highly appreciated as the editors would like to have progressive dialogue and work with prospective authors to bring out a book of wide appeal.  Authors of accepted chapters would be required to sign an agreement of copyright transfer and an originality statement with the publisher.

INQUIRIES AND SUBMISSIONS can be forwarded electronically to the Volume editors:

William McQuay            Waleed W. Smari
The Computer & Information Society, Inc.   Department of Electrical and Computer Engineering
P.O. Box 657
Dayton, OH  45409
  University of Dayton
300 College Park
Dayton, OH 45469-0226
Voice:  (937) 367-3142   Voice:  (937) 229-2795
Fax:   Fax:  (937) 229-4529
Email:   Email:


# of hits: 5470 Copyright © 2007-2019 CIS Build:2018.07.04:10.51.51 EDT