The 4th International Conference on Security Science and Technology (ICSST 2015) covers topics such as:
- Access control and secure audit
- Security verification
- Risk Evaluation and Security Certification
- Vulnerability and threat analysis
- Verification Techniques for Complex Software Systems
- Computer Forensics
- Intellectual Property Protection
- Real-time and Embedded Systems
- Anonymity services
- Fraud Control and Information Hiding
- Trust Management
- Key Management and Key Recovery
- Cryptography and its Applications
- Web Services Modeling and Compositions
- Usable security
- Pervasive and Ubiquitous Computing
- Intrusion Detection and Response
- Privacy and identity management
- Design and Analysis of Cryptosystems
- Security Protocols
- Smart Cards
- Authentication and Authorization
- Security Models
- Formal Methods and Approaches to Manage and Control Complex Systems
- Tools, Environments, and Languages for Complex Systems
- Security in ubiquitous computing
- Security and privacy in business services
- Mobile Communications Security
- Security engineering
- Integration of Heterogeneous Technologies
- Cryptographic primitives
- Analysis of security protocols
- Secure mobile code
- Information and Security Assurance
- Content Production and Distribution Systems, Mobile and Multi-channel Systems
- Secure operating systems
- Electronic Commerce Security
- Critical Infrastructures Protection
- Systems and Software Safety and Security
- Data and Systems Integrity
- Sensor Network Systems and Applications
- Human Factors and Collaborative Aspects
- Software Protection
- Software Complexity Visualization
- Security requirements engineering
- Network Security
- Watermarking
- Privacy Protection
- Avionics and Automobile Software
- Biometrics
- Interoperability and Standardization
- Electronic payment systems
- Software Architecture and System Engineering
- Virtual Environments for Managing Complexity
- Language-based security
- Context Awareness Computing
- Software and System Development and Control Processes for Complex Systems
- Enforcement of security policies
The 4th International Conference on Security Science and Technology (ICSST 2015) brings together engineers, researchers and scientists.