4th International Conference on Security Science and Technology (ICSST 2015)

  • 15-16 Jan 2015
  • Holiday Inn Portsmouth, United Kingdom

Description

Topics
  • Access control and secure audit
  • Security verification
  • Risk Evaluation and Security Certification
  • Vulnerability and threat analysis
  • Verification Techniques for Complex Software Systems
  • Computer Forensics
  • Intellectual Property Protection
  • Real-time and Embedded Systems
  • Anonymity services
  • Fraud Control and Information Hiding
  • Trust Management
  • Key Management and Key Recovery
  • Cryptography and its Applications
  • Web Services Modeling and Compositions
  • Usable security
  • Pervasive and Ubiquitous Computing
  • Intrusion Detection and Response
  • Privacy and identity management
  • Design and Analysis of Cryptosystems
  • Security Protocols
  • Smart Cards
  • Authentication and Authorization
  • Security Models
  • Formal Methods and Approaches to Manage and Control Complex Systems
  • Tools, Environments, and Languages for Complex Systems
  • Security in ubiquitous computing
  • Security and privacy in business services
  • Mobile Communications Security
  • Security engineering
  • Integration of Heterogeneous Technologies
  • Cryptographic primitives
  • Analysis of security protocols
  • Secure mobile code
  • Information and Security Assurance
  • Content Production and Distribution Systems, Mobile and Multi-channel Systems
  • Secure operating systems
  • Electronic Commerce Security
  • Critical Infrastructures Protection
  • Systems and Software Safety and Security
  • Data and Systems Integrity
  • Sensor Network Systems and Applications
  • Human Factors and Collaborative Aspects
  • Software Protection
  • Software Complexity Visualization
  • Security requirements engineering
  • Network Security
  • Watermarking
  • Privacy Protection
  • Avionics and Automobile Software
  • Biometrics
  • Interoperability and Standardization
  • Electronic payment systems
  • Software Architecture and System Engineering
  • Virtual Environments for Managing Complexity
  • Language-based security
  • Context Awareness Computing
  • Software and System Development and Control Processes for Complex Systems
  • Enforcement of security policies
Who should Attend

Engineers, researchers and scientists.

Past Events

Important

Please, check "International Conference on Security Science and Technology (ICSST)" official website for possible changes, before making any traveling arrangements

Event Categories

Business: Security & Safety
Science: Computer Science, Engineering
Technology: IT Security

Other Events with Similar Categories

Other Events with Similar Location or Organizer

Featured Conferences & Exhibitions