Call for Papers
The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. Papers without a clear application to security, however, will be considered out of scope and may be rejected without full review. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection.
The topics of interests include, but are not limited to:
- Anti-Forensics Techniques
- Application Security
- Authentication and Access Control Systems
- Critical Infrastructure Protection
- Cyber Warfare Trends and Approaches
- Denial-of-Service Attacks and Countermeasures
- Digital Forensics
- Digital Rights Management
- Distributed and Pervasive Systems Security
- Embedded Systems Security
- Enterprise Systems Security
- Executable Content and Content Filtering
- File and Files System Security
- Fraud Management
- Hardware Security
- Human-Computer Interaction and Security
- Identity Management
- Intellectual Property Protection
- Key Distribution and Management
- Mobile System Security
- Multimedia and Document Security
- Network Infrastructure Security
- Operating Systems and Database Security
- Peer-to-Peer Security
- Secure Communications and Information Flow
- Secure Sensor Networks
- Security for Grid Computing
- Security in Cloud Computing/Social Networks
- Security in e-services
- Security of Web-Based Applications
- Surveillance Systems
|
- Accountability
- Anonymity
- Analysis of Network and Security Protocols
- Authorship Analysis
- Biometrics Standards and Standardization
- Border Security
- Business Continuity & Disaster Recovery Planning
- Crowd Management
- Emergency Response and Management
- Encryption and Cryptography
- Forecasting Terrorism
- Incident Handling and Penetration Testing
- Information Hiding
- Intrusion and Anomaly Detection and Prevention
- Investigation of Insider Attacks
- Language-Based Security
- Malware Forensics and Anti-Malware Techniques
- Protocol Security
- Secure Software Development
- Security Architectures
- Security Metrics
- Self-Protecting and Self-Healing Systems
- Social Engineering
- Social Network Analysis
- Template Protection and Liveliness Detection
- Threats, Vulnerabilities, and Risk Management
- Economics of Security
- Laws and Regulations/Legal Issues
- Security Policies and Trust Management
- Security Education and Training
- New Threats and Non-Traditional Approaches
- Theories, Methods and Tools in Managing Security
|
Special Session on Cloud Security and Cryptography |
- Accountability for Cloud Computing
- Availability, Recovery and Auditing
- Cloud Access Control and Key Management
- Cloud-Centric Threat Models
- Coding and Cryptography for Secure Cloud
- Parallel and Dynamic Searchable Symmetric Encryption
- Attribute-Based Encryption
- Multi-Party Computation with Low Communication
- Homomorphic Encryption
- Cryptographic Cloud Storage
- Randomness Testing of Modern Encryption Techniques
- Evolution of Cloud Security Measures
- Failure Detection and Prediction
- Cloud Forensics
- Identity Management in the Cloud
- Integrity and Verifiable Computation
|
- Privacy Preserving Technologies in Cloud Computing
- Proofs of Storage
- Remote Attestation Mechanisms in Clouds
- Scalability of Security in Global-Size Clouds
- Secure Cloud Architecture
- Secure Computation Outsourcing
- Secure Data Management
- Secure Management of Virtualized Resources
- Secure Mobile Cloud
- Security for Emerging Cloud Programming Models
- Secured Searching in Cloud Data
- Trust and Policy Management in Clouds
- Continuous Security Monitoring
- New Cloud-Aware Web Service Security Paradigms and Mechanisms
- Business and Security Risk Models and Clouds
- Case Studies and Experimental Implementations
|
All aceepted papers will be published in the proceedings.
Journal Special Issues
Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):
Important Dates
Full Paper Submission Ends |
June 10, 2016 |
Acceptance Notification |
July 06, 2016 |
Final Paper Deadline |
July 31, 2016 |
Author Registration Closes |
TBA |