posted by user: ruankeyun || 6684 views || tracked by 15 users: [display]

CCFAIP 2011 : [CALL FOR BOOK CHAPTER] Cybercrime and Cloud Forensics: Applications for Investigation Processes, to be published by IGI Global

FacebookTwitterLinkedInGoogle

Link: http://igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=41b320c0-7dd0-489c-b996-c5a9dcf81cb4
 
When Sep 1, 2010 - Jul 15, 2011
Where Dublin
Submission Deadline Dec 3, 2010
Final Version Due Jul 15, 2011
Categories    cloud computing   digital forensics   security   cybercrime
 

Call For Papers

Editors:
Keyun Ruan
Centre for Cybercrime Investigation, University College Dublin, Ireland

Introduction
Cloud computing has the potential to become one of the most transformative developments in how information technology services are created, delivered, and accessed. However, cloud computing represents both opportunity and crisis for cybercrime investigation and digital forensics. With the rise of cyber attacks and various crimes in the highly complex multi-jurisdictional and multi-tenant cloud environments, there is an urgent need to extend the applications of investigation processes into the Cloud.

Objective of the Book
This book will introduce the new area of cloud forensics and collect research and case studies on current, state-of-the-art applications for investigation processes in cloud computing environments. Chapters may address cloud forensics applications from the perspectives of cloud providers, cloud customers, security architects, law enforcement agencies, research institutes, etc. This book will serve as a reference for cloud communities, digital forensics practitioners, researchers who wish to understand current issues, advancing research, and technical innovations in the field of cloud forensics.

Target Audience
Cloud technologists at all levels; Cloud incident response teams; Cloud system and security administrators and architects; Cloud security managers; Cloud computing researchers; Digital forensics practitioners; Digital forensics researchers; Law enforcement; Ethical hackers.

Recommended topics include, but are NOT limited to the following:
Cloud customers (enterprise, government, etc.)
Cloud adoption
Usage scenarios
Forensic demand/usage
Forensic capability
Sample crime/policy violation cases
Sample investigation cases/scenarios/processes
Cloud providers
The evolution of cloud computing
Future of cloud computing
Cloud services
Forensic demand/usage
Forensic capability
Sample crime/policy violation cases
Sample investigation cases/scenarios/processes
Law Enforcement
Digital forensics and law
Current state of art of cyber law
International collaboration in battling cyber crime
Cloud computing and law
Multi-jurisdiction issues
Multi-tenancy issues
Service level agreement and cloud forensics
Digital evidence and cloud evidence and evidence admission
Cyber policing
Sample crime cases
Sample investigation cases/scenarios/processes
Digital Forensics Practice and Research
History and development of digital forensics
The rise of cybercrime
Cloud computing a new battlefield
Sample crime cases
Digital forensic process
Applications of digital forensic process in cloud computing
Challenges in applying current digital forensic best practices to cloud computing
Future of cloud forensics
Sample investigation cases/scenarios/processes
Security Architecture and Forensic Awareness
Public cloud
Private cloud
Hybrid cloud
Infrastructure as a Service
Platform as a Service
Software as a Service
Forensics as a Service
Ethical hacking

Submission Procedure
Researchers and practitioners are invited to submit on or before December 3, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by December 15, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by Feburary 28, 2011. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference”, “Business Science Reference”, and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com. This book is scheduled for publication in 2012.

Important Dates
December 3, 2010: Proposal Submission Deadline
December 15, 2010: Notification of Acceptance
February 28, 2011: Full Chapter Submission
May 15, 2011: Review Results Returned
July 15, 2011: Final Chapter Submission
August 15, 2011: Final Deadline


Inquiries and submissions can be forwarded electronically (Word document):
Ms Keyun Ruan
Centre for Cyber Crime Investigation
School of Computer Science and Informatics
University College Dublin, Belfield
Dublin 4, Dublin, Ireland
Tel: +353 1 716 2405 or +61 2 8006 2864
Mobile: +353 (0) 87 6121726
Email: keyun.ruan@ucd.ie
Web: RuanKeyun.com

Related Resources

CLOUD 2018   The 11th International Conference on Cloud Computing
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
Ei - ICBDA - IEEE 2018   2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE Xplore and Ei Compendex
CCGrid 2018   IEEE International Symposium on Cluster Computing and the Grid
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
BigData Congress 2018   The 7th International Congress on Big Data
e-Democracy 2017   7th International Conference on Privacy-Preserving, Secure, Intelligent e-Government Services