2009-07-30

[Tccc] CFP - Third Special Issue on Security and Management - JNSM of Springer

CALL FOR PAPERS
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
Third Special Issue on Security and Management
Guest-edited by Carlos Becker Westphall and Peter Mueller
Manuscript due September 30, 2009

Political and military events, coupled with the accelerating frequency of
cyber attacks on network/IT systems and technical revelations of
management protocol insecurities, underscore the substantial risks
associated with network, systems and applications management. Through
management systems, rogue elements can perpetrate targeted as well as
system-wide fraud, theft of services, and disruption of capabilities and
management data. Worse yet, due to the extended, pervasive reach of
management systems, rogues can get a stranglehold on the IT and networking
resources of an enterprise, entire industry sectors, even national
critical infrastructures or governments.

Consequently, interest in the security aspects of management systems has
sky rocketed. Security is an essential feature, not an after-thought, of
an information enterprise. The commercial sector is pursuing double-digit
growth rates for IT and network security spending. Corporations embracing
e-business strategies that involve integration of systems and resources
with business partners want assurances that their internal resources will
not be compromised by vulnerable management systems, internal or external.
Corporations and governments remain at risk for cyber attack on
mission-critical management components. Legislation is making security an
R&D priority.

This special issue of the Journal of Network and Systems Management in
collaboration with IEEE CNOM (Committee on Network Operation and
Management) and CISTC (Communications and Information Security) Technical
Committees will consider topics associated with both the management of
security in telecommunications, network, and systems environments, and the
security for management systems in such environments. Submissions may span
a broad range of topics, e.g.,:

- Security and management in wireless, multicast, multi-media and/or
converged environments
- Critical Infrastructure Protection (CIP); continuity issues for security
and management in CIP
- Threats, vulnerabilities and requirements for security management and
management system security
- Policies and SLAs for managed security and security for management
systems
- Security Policy Management
- Attack management systems and management systems as attack platforms
- Scalability, efficiency and reliability of secure management and
security
management solutions
- End-to-end secure management and security management across distributed
domains
- High assurance and trustworthy management
- The Common Criteria in standardizing security characteristics of
management systems
- Managed security service provisioning and managed security service
providers
- Security management best practices
- Testing and Evaluating security management and management system
security
solutions
- Open Source solutions for security management and management system
security
- Detection, analysis and elimination of exposures and attacks in
management
systems
- Legal, insurance and Board Room liabilities, linked liabilities and
product liabilities
- Laws and policies on management systems, operations, administration and
maintenance
- Integration of security and management with business goals/strategies
- Case studies and experiences of secure management and security
management
systems

Instructions to Contributors:
Authors are invited to prepare their manuscripts in single-column,
double-spaced format, and submit at http://www.editorialmanager.com/jons/.
Authors must register first – an easy initial step. Acceptable file
formats are given on the site.

Schedule:
Manuscript due: September 30, 2009
Notification of acceptance: November 30, 2009
Final manuscript due: February 28, 2010
Publication date: September 2010

Guest Editors:

Prof. Carlos Becker Westphall
Federal University of Santa Catarina
Department of Informatics and Statistics Brazil
Email: westphal at inf.ufsc.br

Dr. Peter Mueller
IBM Zurich Research Laboratory
Switzerland
Email: pmu at zurich.ibm.com

No comments: