------------------------------------------------------------------------------- Fourth International Symposium on Security in Computing and Communications (SSCC'16) September 21-24, 2016, Jaipur, India http://acn-conference.org/sscc2016/ ------------------------------------------------------------------------------- SSCC'16 aims to provide the most relevant opportunity to bring together researchers and practitioners from both academia and industry to exchange their knowledge and discuss their research findings. SSCC'16 will be held in Jaipur, India. Jaipur is a major tourist attraction in India and belongs to the tourist Golden Triangle of Delhi, Jaipur and Agra. The Symposium will feature plenary/keynote talks, workshops, demonstrations, parallel technical sessions and tutorials. All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS). The proceedings will be available via the SpringerLink digital library. The volumes of this series are submitted for inclusion to the leading indexing services including DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is 0.15 The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. The topics of interests include, but are not limited to: Anti-Forensics Techniques Application Security Authentication and Access Control Systems Critical Infrastructure Protection Cyber Warfare Trends and Approaches Denial-of-Service Attacks and Countermeasures Digital Forensics Digital Rights Management Distributed and Pervasive Systems Security Embedded Systems Security Enterprise Systems Security Executable Content and Content Filtering File and Files System Security Fraud Management Hardware Security Human-Computer Interaction and Security Identity Management Intellectual Property Protection Key Distribution and Management Mobile System Security Multimedia and Document Security Network Infrastructure Security Operating Systems and Database Security Peer-to-Peer Security Secure Communications and Information Flow Secure Sensor Networks Security for Grid Computing Security in Cloud Computing/Social Networks Security in e-services Security of Web-Based Applications Surveillance Systems Accountability Anonymity Analysis of Network and Security Protocols Authorship Analysis Biometrics Standards and Standardization Border Security Business Continuity & Disaster Recovery Planning Crowd Management Emergency Response and Management Encryption and Cryptography Forecasting Terrorism Incident Handling and Penetration Testing Information Hiding Intrusion and Anomaly Detection and Prevention Investigation of Insider Attacks Language-Based Security Malware Forensics and Anti-Malware Techniques Protocol Security Secure Software Development Security Architectures Security Metrics Self-Protecting and Self-Healing Systems Social Engineering Social Network Analysis Template Protection and Liveliness Detection Threats, Vulnerabilities, and Risk Management Economics of Security Laws and Regulations/Legal Issues Security Policies and Trust Management Security Education and Training New Threats and Non-Traditional Approaches Theories, Methods and Tools in Managing Security Special Session on Cloud Security and Cryptography -------------------------------------------------- Accountability for Cloud Computing Availability, Recovery and Auditing Cloud Access Control and Key Management Cloud-Centric Threat Models Coding and Cryptography for Secure Cloud Parallel and Dynamic Searchable Symmetric Encryption Attribute-Based Encryption Multi-Party Computation with Low Communication Homomorphic Encryption Cryptographic Cloud Storage Randomness Testing of Modern Encryption Techniques Evolution of Cloud Security Measures Failure Detection and Prediction Cloud Forensics Identity Management in the Cloud Integrity and Verifiable Computation Privacy Preserving Technologies in Cloud Computing Proofs of Storage Remote Attestation Mechanisms in Clouds Scalability of Security in Global-Size Clouds Secure Cloud Architecture Secure Computation Outsourcing Secure Data Management Secure Management of Virtualized Resources Secure Mobile Cloud Security for Emerging Cloud Programming Models Secured Searching in Cloud Data Trust and Policy Management in Clouds Continuous Security Monitoring New Cloud-Aware Web Service Security Paradigms and Mechanisms Business and Security Risk Models and Clouds Case Studies and Experimental Implementations Important Dates ---------------- Full Paper Submission Ends: April 30, 2016 Acceptance Notification: June 30, 2016 Final Paper Deadline: July 31, 2016