CFP: JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT

lunes, 25 de mayo de 2009

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
Third Special Issue on Security and Management
Guest-edited by Carlos Becker Westphall and Peter Mueller
Manuscript due September 30, 2009

Political and military events, coupled with the accelerating frequency of cyber attacks on network/IT systems and technical revelations of management protocol insecurities, underscore the substantial risks associated with network, systems and applications management. Through
management systems, rogue elements can perpetrate targeted as well as system-wide fraud, theft of services, and disruption of capabilities and management data. Worse yet, due to the extended, pervasive reach of management systems, rogues can get a stranglehold on the IT and networking resources of an enterprise, entire industry sectors, even national critical infrastructures or governments.

Consequently, interest in the security aspects of management systems has sky rocketed. Security is an essential feature, not an after-thought, of an information enterprise. The commercial sector is pursuing double-digit growth rates for IT and network security spending. Corporations embracing e-business strategies that involve integration of systems and resources
with business partners want assurances that their internal resources will not be compromised by vulnerable management systems, internal or external.
Corporations and governments remain at risk for cyber attack on mission-critical management components. Legislation is making security an R&D priority.

This special issue of the Journal of Network and Systems Management in collaboration with IEEE CNOM (Committee on Network Operation and Management) and CISTC (Communications and Information Security) Technical Committees will consider topics associated with both the management of security in telecommunications, network, and systems environments, and the security for management systems in such environments. Submissions may span a broad range of topics, e.g.,:

- Security and management in wireless, multicast, multi-media and/or converged environments
- Critical Infrastructure Protection (CIP); continuity issues for security and management in CIP
- Threats, vulnerabilities and requirements for security management and management system security
- Policies and SLAs for managed security and security for management systems
- Security Policy Management
- Attack management systems and management systems as attack platforms
- Scalability, efficiency and reliability of secure management and security management solutions
- End-to-end secure management and security management across distributed domains
- High assurance and trustworthy management
- The Common Criteria in standardizing security characteristics of management systems
- Managed security service provisioning and managed security service providers
- Security management best practices
- Testing and Evaluating security management and management system security solutions
- Open Source solutions for security management and management system security
- Detection, analysis and elimination of exposures and attacks in management systems
- Legal, insurance and Board Room liabilities, linked liabilities and product liabilities
- Laws and policies on management systems, operations, administration and maintenance
- Integration of security and management with business goals/strategies
- Case studies and experiences of secure management and security management systems

Instructions to Contributors:
Authors are invited to prepare their manuscripts in single-column, double-spaced format, and submit at http://www.editorialmanager.com/jons/. Authors must register first – an easy initial step. Acceptable file formats are given on the site.

Schedule:
Manuscript due: September 30, 2009
Notification of acceptance: November 30, 2009
Final manuscript due: February 28, 2010
Publication date: September 2010

Guest Editors:
Prof. Carlos Becker Westphall
Federal University of Santa Catarina
Department of Informatics and Statistics Brazil
Email: westphal at inf.ufsc.br

Publicado por unimauro en 10:25  
0 comentarios

Publicar un comentario