posted by user: ruankeyun || 9748 views || tracked by 17 users: [display]

CCFAIP 2011 : [CALL FOR BOOK CHAPTER] Cybercrime and Cloud Forensics: Applications for Investigation Processes, to be published by IGI Global

FacebookTwitterLinkedInGoogle

Link: http://igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=41b320c0-7dd0-489c-b996-c5a9dcf81cb4
 
When Sep 1, 2010 - Jul 15, 2011
Where Dublin
Submission Deadline Dec 3, 2010
Final Version Due Jul 15, 2011
Categories    cloud computing   digital forensics   security   cybercrime
 

Call For Papers

Editors:
Keyun Ruan
Centre for Cybercrime Investigation, University College Dublin, Ireland

Introduction
Cloud computing has the potential to become one of the most transformative developments in how information technology services are created, delivered, and accessed. However, cloud computing represents both opportunity and crisis for cybercrime investigation and digital forensics. With the rise of cyber attacks and various crimes in the highly complex multi-jurisdictional and multi-tenant cloud environments, there is an urgent need to extend the applications of investigation processes into the Cloud.

Objective of the Book
This book will introduce the new area of cloud forensics and collect research and case studies on current, state-of-the-art applications for investigation processes in cloud computing environments. Chapters may address cloud forensics applications from the perspectives of cloud providers, cloud customers, security architects, law enforcement agencies, research institutes, etc. This book will serve as a reference for cloud communities, digital forensics practitioners, researchers who wish to understand current issues, advancing research, and technical innovations in the field of cloud forensics.

Target Audience
Cloud technologists at all levels; Cloud incident response teams; Cloud system and security administrators and architects; Cloud security managers; Cloud computing researchers; Digital forensics practitioners; Digital forensics researchers; Law enforcement; Ethical hackers.

Recommended topics include, but are NOT limited to the following:
Cloud customers (enterprise, government, etc.)
Cloud adoption
Usage scenarios
Forensic demand/usage
Forensic capability
Sample crime/policy violation cases
Sample investigation cases/scenarios/processes
Cloud providers
The evolution of cloud computing
Future of cloud computing
Cloud services
Forensic demand/usage
Forensic capability
Sample crime/policy violation cases
Sample investigation cases/scenarios/processes
Law Enforcement
Digital forensics and law
Current state of art of cyber law
International collaboration in battling cyber crime
Cloud computing and law
Multi-jurisdiction issues
Multi-tenancy issues
Service level agreement and cloud forensics
Digital evidence and cloud evidence and evidence admission
Cyber policing
Sample crime cases
Sample investigation cases/scenarios/processes
Digital Forensics Practice and Research
History and development of digital forensics
The rise of cybercrime
Cloud computing a new battlefield
Sample crime cases
Digital forensic process
Applications of digital forensic process in cloud computing
Challenges in applying current digital forensic best practices to cloud computing
Future of cloud forensics
Sample investigation cases/scenarios/processes
Security Architecture and Forensic Awareness
Public cloud
Private cloud
Hybrid cloud
Infrastructure as a Service
Platform as a Service
Software as a Service
Forensics as a Service
Ethical hacking

Submission Procedure
Researchers and practitioners are invited to submit on or before December 3, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by December 15, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by Feburary 28, 2011. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference”, “Business Science Reference”, and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com. This book is scheduled for publication in 2012.

Important Dates
December 3, 2010: Proposal Submission Deadline
December 15, 2010: Notification of Acceptance
February 28, 2011: Full Chapter Submission
May 15, 2011: Review Results Returned
July 15, 2011: Final Chapter Submission
August 15, 2011: Final Deadline


Inquiries and submissions can be forwarded electronically (Word document):
Ms Keyun Ruan
Centre for Cyber Crime Investigation
School of Computer Science and Informatics
University College Dublin, Belfield
Dublin 4, Dublin, Ireland
Tel: +353 1 716 2405 or +61 2 8006 2864
Mobile: +353 (0) 87 6121726
Email: keyun.ruan@ucd.ie
Web: RuanKeyun.com

Related Resources

CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SEAS 2025   14th International Conference on Software Engineering and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CompAuto--EI 2025   2025 4th International Conference on Computers and Automation (CompAuto 2025)
ccpi 2025   16th International Workshop on Cloud-Edge Continuum Projects and Initiatives (CCPI)
WCSE--EI 2025   2025 The 15th International Workshop on Computer Science and Engineering (WCSE 2025)
HICSS 2025   Cybercrime at HICSS 58
3CVIP 2025   2025 4th Asia Conference on Cloud Computing, Computer Vision and Image Processing (3CVIP 2025)
ICMLSC--EI 2025   2025 The 9th International Conference on Machine Learning and Soft Computing (ICMLSC 2025)