Difference between revisions of "ARES 2013"
(Created page with "{{Event |Acronym=ARES 2013 |Title=8th International Conference on Availability, Reliability, and Security |Series=ARES |Type=Conference |Start date=2013/09/02 |End date=2013/0...") |
|||
| Line 10: | Line 10: | ||
|Country=Germany | |Country=Germany | ||
}} | }} | ||
| − | + | The 8th International Conference on Availability, Reliability and Security (ARES) 2013 | |
| + | |||
==Topics== | ==Topics== | ||
| + | * Authorization and Authentication | ||
| + | * Availability and Reliability | ||
| + | * Business Continuity & Resilience | ||
| + | * Cost/Benefit Analysis | ||
| + | * Cryptography | ||
| + | * Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics) | ||
| + | * Dependability Aspects of Electronic Government (e-Government) | ||
| + | * Dependability Administration | ||
| + | * Dependability in Open Source Software | ||
| + | * Designing Security Requirements | ||
| + | * Digital Forensics | ||
| + | * E-Commerce Dependability | ||
| + | * Failure Prevention | ||
| + | * Identity Management | ||
| + | * IPR of Security Technology | ||
| + | * Incident Response and Prevention | ||
| + | * Information Flow Control | ||
| + | * Information Hiding | ||
| + | * Internet Dependability | ||
| + | * Interoperability Aspects | ||
| + | * Intrusion Detection and Fraud Detection | ||
| + | * Legal Issues | ||
| + | * Mobile Security | ||
| + | * Network and Organizational Vulnerability Analysis | ||
| + | * Network Security | ||
| + | * Privacy-Enhancing Technologies | ||
| + | * Process based Security Models and Methods | ||
| + | * RFID Security and Privacy | ||
| + | * Risk planning, Analysis & Awareness | ||
| + | * Safety Critical Systems | ||
| + | * Secure Enterprise Architectures | ||
| + | * Security Issues for Ubiquitous Systems | ||
| + | * Security and Privacy in E-Health | ||
| + | * Security and Trust Management in P2P and Grid applications | ||
| + | * Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications | ||
| + | * Security and Usability | ||
| + | * Security as Quality of Service | ||
| + | * Security in Distributed Systems / Distributed Databases | ||
| + | * Security in Electronic Payments | ||
| + | * Security in Electronic Voting | ||
| + | * Software Engineering of Dependable Systems | ||
| + | * Software Security | ||
| + | * Standards, Guidelines and Certification | ||
| + | * Survivability of Computing Systems | ||
| + | * Temporal Aspects of Dependability | ||
| + | * Threats and Attack Modelling | ||
| + | * Trusted Computing | ||
| + | * Tools for Dependable System Design and Evaluation | ||
| + | * Trust Models and Trust Management | ||
| + | * VOIP, Wireless Security | ||
| + | |||
| + | |||
==Submissions== | ==Submissions== | ||
==Important Dates== | ==Important Dates== | ||
Revision as of 10:32, 21 August 2020
| ARES 2013 | |
|---|---|
8th International Conference on Availability, Reliability, and Security
| |
| Event in series | ARES |
| Dates | 2013/09/02 (iCal) - 2013/09/06 |
| Homepage: | https://www.ares-conference.eu/ares2013/www.ares-conference.eu/conf/index.html |
| Location | |
| Location: | Regensburg, Germany |
Loading map... | |
| Table of Contents | |
Contents | |
The 8th International Conference on Availability, Reliability and Security (ARES) 2013
Topics
- Authorization and Authentication
- Availability and Reliability
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
- Dependability Aspects of Electronic Government (e-Government)
- Dependability Administration
- Dependability in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Failure Prevention
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding
- Internet Dependability
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security
- Privacy-Enhancing Technologies
- Process based Security Models and Methods
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security Issues for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Standards, Guidelines and Certification
- Survivability of Computing Systems
- Temporal Aspects of Dependability
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- VOIP, Wireless Security
Submissions
Important Dates
Facts about "ARES 2013"
| Acceptance rate | 24.2 + |
| Accepted papers | 22 + |
| Acronym | ARES 2013 + |
| End date | September 6, 2013 + |
| Event in series | ARES + |
| Event type | Conference + |
| Has coordinates | 49° 1' 10", 12° 5' 51"Latitude: 49.019533333333 Longitude: 12.097486111111 + |
| Has location city | Regensburg + |
| Has location country | Category:Germany + |
| Has program chair | Günther Pernul + and Ravi Sandhu + |
| Has workshop chair | Edgar Weippl + |
| Homepage | https://www.ares-conference.eu/ares2013/www.ares-conference.eu/conf/index.html + |
| IsA | Event + |
| Notification | May 15, 2013 + |
| Start date | September 2, 2013 + |
| Submission deadline | March 1, 2013 + |
| Submitted papers | 91 + |
| Title | 8th International Conference on Availability, Reliability, and Security + |
| Workshop deadline | February 1, 2013 + |