-------------------------------------------------------------------------------
Fourth International Symposium on Security in Computing and Communications 
  (SSCC'16)

September 21-24, 2016, Jaipur, India 

http://acn-conference.org/sscc2016/
-------------------------------------------------------------------------------

SSCC'16 aims to provide the most relevant opportunity to bring
together researchers and practitioners from both academia and industry
to exchange their knowledge and discuss their research
findings. SSCC'16 will be held in Jaipur, India. Jaipur is a major
tourist attraction in India and belongs to the tourist Golden Triangle
of Delhi, Jaipur and Agra. The Symposium will feature plenary/keynote
talks, workshops, demonstrations, parallel technical sessions and
tutorials.

All accepted papers will be published by Springer in Communications in
Computer and Information Science Series(CCIS). The proceedings will be
available via the SpringerLink digital library. The volumes of this
series are submitted for inclusion to the leading indexing services
including DBLP, Google Scholar, EI-Compendex, Mathematical Reviews,
SCImago, and Scopus. CCIS volumes are also submitted for the inclusion
in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is
0.15

The program committee solicits previously unpublished papers offering
novel research contributions in any aspect of security in computing
and communications.

The topics of interests include, but are not limited to: 

Anti-Forensics Techniques
Application Security
Authentication and Access Control Systems
Critical Infrastructure Protection
Cyber Warfare Trends and Approaches
Denial-of-Service Attacks and Countermeasures
Digital Forensics
Digital Rights Management
Distributed and Pervasive Systems Security
Embedded Systems Security
Enterprise Systems Security
Executable Content and Content Filtering
File and Files System Security
Fraud Management
Hardware Security
Human-Computer Interaction and Security
Identity Management
Intellectual Property Protection
Key Distribution and Management
Mobile System Security
Multimedia and Document Security
Network Infrastructure Security
Operating Systems and Database Security
Peer-to-Peer Security
Secure Communications and Information Flow
Secure Sensor Networks
Security for Grid Computing
Security in Cloud Computing/Social Networks
Security in e-services
Security of Web-Based Applications
Surveillance Systems
Accountability
Anonymity
Analysis of Network and Security Protocols
Authorship Analysis
Biometrics Standards and Standardization
Border Security
Business Continuity & Disaster Recovery Planning
Crowd Management
Emergency Response and Management
Encryption and Cryptography
Forecasting Terrorism
Incident Handling and Penetration Testing
Information Hiding
Intrusion and Anomaly Detection and Prevention
Investigation of Insider Attacks
Language-Based Security
Malware Forensics and Anti-Malware Techniques
Protocol Security
Secure Software Development
Security Architectures
Security Metrics
Self-Protecting and Self-Healing Systems
Social Engineering
Social Network Analysis
Template Protection and Liveliness Detection
Threats, Vulnerabilities, and Risk Management
Economics of Security
Laws and Regulations/Legal Issues
Security Policies and Trust Management
Security Education and Training
New Threats and Non-Traditional Approaches
Theories, Methods and Tools in Managing Security

Special Session on Cloud Security and Cryptography
--------------------------------------------------
Accountability for Cloud Computing
Availability, Recovery and Auditing
Cloud Access Control and Key Management
Cloud-Centric Threat Models
Coding and Cryptography for Secure Cloud
Parallel and Dynamic Searchable Symmetric Encryption
Attribute-Based Encryption
Multi-Party Computation with Low Communication
Homomorphic Encryption
Cryptographic Cloud Storage
Randomness Testing of Modern Encryption Techniques
Evolution of Cloud Security Measures
Failure Detection and Prediction
Cloud Forensics
Identity Management in the Cloud
Integrity and Verifiable Computation
Privacy Preserving Technologies in Cloud Computing
Proofs of Storage
Remote Attestation Mechanisms in Clouds
Scalability of Security in Global-Size Clouds
Secure Cloud Architecture
Secure Computation Outsourcing
Secure Data Management
Secure Management of Virtualized Resources
Secure Mobile Cloud
Security for Emerging Cloud Programming Models
Secured Searching in Cloud Data
Trust and Policy Management in Clouds
Continuous Security Monitoring
New Cloud-Aware Web Service Security Paradigms and Mechanisms
Business and Security Risk Models and Clouds
Case Studies and Experimental Implementations

Important Dates
----------------
Full Paper Submission Ends: April 30, 2016
Acceptance Notification: June 30, 2016
Final Paper Deadline: July 31, 2016