SSCC 2015 - Third International Symposium on Security in Computing and Communications (SSCC’15)
Topics/Call fo Papers
Third International Symposium on Security in Computing and Communications (SSCC’15)
August 10-13, 2015, Kochi, India
http://icacci-conference.org/sscc2015/
---
SSCC’15 aims to provide the most relevant opportunity to bring together researchers and practitioners from both academia and industry to exchange their knowledge and discuss their research findings. SSCC 2015 is co-located with Fourth International Conference on Advances in Computing, Communications and Informatics (ICACCI-2015).
The symposium proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus.
The Conference will be held in Kochi, Kerala, India. Kerala, located on the Southwestern tip of India, enjoys unique geographical features that have made it one of the most sought-after tourist destinations in Asia.
The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. The topics of interests include, but are not limited to:
Anti-Forensics Techniques
Application Security
Authentication and Access Control Systems
Critical Infrastructure Protection
Cyber Warfare Trends and Approaches
Denial-of-Service Attacks and Countermeasures
Digital Forensics
Digital Rights Management
Distributed and Pervasive Systems Security
Embedded Systems Security
Enterprise Systems Security
Executable Content and Content Filtering
File and Files System Security
Fraud Management
Hardware Security
Human-Computer Interaction and Security
Identity Management
Intellectual Property Protection
Key Distribution and Management
Mobile System Security
Multimedia and Document Security
Network Infrastructure Security
Operating Systems and Database Security
Peer-to-Peer Security
Secure Communications and Information Flow
Secure Sensor Networks
Security for Grid Computing
Security in Cloud Computing/Social Networks
Security in e-services
Security of Web-Based Applications
Surveillance Systems
Accountability
Anonymity
Analysis of Network and Security Protocols
Authorship Analysis
Biometrics Standards and Standardization
Border Security
Business Continuity & Disaster Recovery Planning
Crowd Management
Emergency Response and Management
Encryption and Cryptography
Forecasting Terrorism
Incident Handling and Penetration Testing
Information Hiding
Intrusion and Anomaly Detection and Prevention
Investigation of Insider Attacks
Language-Based Security
Malware Forensics and Anti-Malware Techniques
Protocol Security
Secure Software Development
Security Architectures
Security Metrics
Self-Protecting and Self-Healing Systems
Social Engineering
Social Network Analysis
Template Protection and Liveliness Detection
Threats, Vulnerabilities, and Risk Management
Economics of Security
Laws and Regulations/Legal Issues
Security Policies and Trust Management
Security Education and Training
New Threats and Non-Traditional Approaches
Theories, Methods and Tools in Managing Security
Special Session on Cloud Security and Cryptography
---
Accountability for Cloud Computing
Availability, Recovery and Auditing
Cloud Access Control and Key Management
Cloud-Centric Threat Models
Coding and Cryptography for Secure Cloud
Parallel and Dynamic Searchable Symmetric Encryption
Attribute-Based Encryption
Multi-Party Computation with Low Communication
Homomorphic Encryption
Cryptographic Cloud Storage
Randomness Testing of Modern Encryption Techniques
Evolution of Cloud Security Measures
Failure Detection and Prediction
Cloud Forensics
Identity Management in the Cloud
Integrity and Verifiable Computation
Privacy Preserving Technologies in Cloud Computing
Proofs of Storage
Remote Attestation Mechanisms in Clouds
Scalability of Security in Global-Size Clouds
Secure Cloud Architecture
Secure Computation Outsourcing
Secure Data Management
Secure Management of Virtualized Resources
Secure Mobile Cloud
Security for Emerging Cloud Programming Models
Secured Searching in Cloud Data
Trust and Policy Management in Clouds
Continuous Security Monitoring
New Cloud-Aware Web Service Security Paradigms and Mechanisms
Business and Security Risk Models and Clouds
Case Studies and Experimental Implementations
Important Dates
---
Paper Submission: April 5, 2015
Author Notification: May 5, 2015
Final Paper Deadline: May 31, 2015.
August 10-13, 2015, Kochi, India
http://icacci-conference.org/sscc2015/
---
SSCC’15 aims to provide the most relevant opportunity to bring together researchers and practitioners from both academia and industry to exchange their knowledge and discuss their research findings. SSCC 2015 is co-located with Fourth International Conference on Advances in Computing, Communications and Informatics (ICACCI-2015).
The symposium proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus.
The Conference will be held in Kochi, Kerala, India. Kerala, located on the Southwestern tip of India, enjoys unique geographical features that have made it one of the most sought-after tourist destinations in Asia.
The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. The topics of interests include, but are not limited to:
Anti-Forensics Techniques
Application Security
Authentication and Access Control Systems
Critical Infrastructure Protection
Cyber Warfare Trends and Approaches
Denial-of-Service Attacks and Countermeasures
Digital Forensics
Digital Rights Management
Distributed and Pervasive Systems Security
Embedded Systems Security
Enterprise Systems Security
Executable Content and Content Filtering
File and Files System Security
Fraud Management
Hardware Security
Human-Computer Interaction and Security
Identity Management
Intellectual Property Protection
Key Distribution and Management
Mobile System Security
Multimedia and Document Security
Network Infrastructure Security
Operating Systems and Database Security
Peer-to-Peer Security
Secure Communications and Information Flow
Secure Sensor Networks
Security for Grid Computing
Security in Cloud Computing/Social Networks
Security in e-services
Security of Web-Based Applications
Surveillance Systems
Accountability
Anonymity
Analysis of Network and Security Protocols
Authorship Analysis
Biometrics Standards and Standardization
Border Security
Business Continuity & Disaster Recovery Planning
Crowd Management
Emergency Response and Management
Encryption and Cryptography
Forecasting Terrorism
Incident Handling and Penetration Testing
Information Hiding
Intrusion and Anomaly Detection and Prevention
Investigation of Insider Attacks
Language-Based Security
Malware Forensics and Anti-Malware Techniques
Protocol Security
Secure Software Development
Security Architectures
Security Metrics
Self-Protecting and Self-Healing Systems
Social Engineering
Social Network Analysis
Template Protection and Liveliness Detection
Threats, Vulnerabilities, and Risk Management
Economics of Security
Laws and Regulations/Legal Issues
Security Policies and Trust Management
Security Education and Training
New Threats and Non-Traditional Approaches
Theories, Methods and Tools in Managing Security
Special Session on Cloud Security and Cryptography
---
Accountability for Cloud Computing
Availability, Recovery and Auditing
Cloud Access Control and Key Management
Cloud-Centric Threat Models
Coding and Cryptography for Secure Cloud
Parallel and Dynamic Searchable Symmetric Encryption
Attribute-Based Encryption
Multi-Party Computation with Low Communication
Homomorphic Encryption
Cryptographic Cloud Storage
Randomness Testing of Modern Encryption Techniques
Evolution of Cloud Security Measures
Failure Detection and Prediction
Cloud Forensics
Identity Management in the Cloud
Integrity and Verifiable Computation
Privacy Preserving Technologies in Cloud Computing
Proofs of Storage
Remote Attestation Mechanisms in Clouds
Scalability of Security in Global-Size Clouds
Secure Cloud Architecture
Secure Computation Outsourcing
Secure Data Management
Secure Management of Virtualized Resources
Secure Mobile Cloud
Security for Emerging Cloud Programming Models
Secured Searching in Cloud Data
Trust and Policy Management in Clouds
Continuous Security Monitoring
New Cloud-Aware Web Service Security Paradigms and Mechanisms
Business and Security Risk Models and Clouds
Case Studies and Experimental Implementations
Important Dates
---
Paper Submission: April 5, 2015
Author Notification: May 5, 2015
Final Paper Deadline: May 31, 2015.
Other CFPs
- 2015 Workshop on Heterogeneous Learning
- International Conference on Intelligent Computing
- 42nd Annual International Conference on Language Teaching and Learning & Educational Materials
- 41st Annual International Conference on Language Teaching and Learning & Educational Materials Exhibition
- 2nd International Workshop on Movement and Computing
Last modified: 2014-11-29 22:51:35