2009-09-28

[Tccc] Invitation to Chapter Reviewing Committee - Computer and Network Security

Please Post.

Dear Colleague,

Greetings.

We are in the process to put together a book on Security in Computing
and Networking Systems and we are seeking your help in reviewing chapter
manuscripts received for this book. Each Chapter is about 20-25 pages
long. Each reviewer will have ONE chapter to review, unless she/he
requests more than one. The review period will be in the
October-December, 2009 timeframe. Each chapter draft will have an
evaluation form for the evaluator to fill out and send back.


If you can help with this task as a member of the Chapter Reviewing
Committee, please send us your acceptance via email to smari@arys.org
and wmcquay@ieee.org. Please include in the email your full
affiliation and contact info. Below you find a tentative list of the
chapters titles. Please select at least three titles that you would be
willing to review from and we will do our best to match your preference
with the manuscripts received.


More info about the book can be found at
http://cisedu.us/cis/secBook/09/main/callForChapters.jsp.


Thank you very much for your time and consideration. We hope to hear
from you by this Friday__.


Best Regards.

Waleed W. Smari and Bill McQuay
Book Editors

Chapter 01: The Problem of Computing Systems Security, Understanding
the Enemy and the Defense
Chapter 04: Security in Digital Rights Management
Chapter 07: Inference Based Access Control
Chapter 09: Cryptography and Secure Communications
Chapter 14: Intrusion Detection
Chapter 17: Computer Forensics
Chapter 21: Security Vulnerabilities, Risk Analysis and Management
Chapter 22: Security Visualization
Chapter 24: Formal Methods in Security Verification of Secure Systems
Chapter 28: Principles for Designing a Secure Computing System
Chapter 34: Agent Based Security
Chapter 37: Human-centered Security
Chapter 38: Security in Social Networking Systems
Chapter 39: Trust Mechanisms, Management and Metrics
Chapter 40: Security and Privacy
Chapter 41: Autonomic Security
Chapter 43: Security in Collaboration Computing Systems
Chapter 53: Internet Security
Chapter 55: e-Commerce and Enterprise Systems Security
Chapter 58: Security of Health Care Systems
Chapter 58b: Privacy and Security in Biomedical Applications of Wireless
Sensor Networks
Chapter 59: Security of Embedded Systems
Chapter 60: Security Solutions Using Reconfigurable Computing
Chapter 61: Voice Over IP Security: Surveying the Threats and
Vulnerabilities
Chapter 62: Security for Data Stream Management Systems
Chapter 63: Mutual Authentication Protocols for Low-Cost RFID


_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: