ARES 2018: Difference between revisions
No edit summary |
No edit summary |
||
| (4 intermediate revisions by the same user not shown) | |||
| Line 6: | Line 6: | ||
|Start date=2018/08/27 | |Start date=2018/08/27 | ||
|End date=2018/08/30 | |End date=2018/08/30 | ||
|Submission deadline=2018/03/16 | |||
|Homepage=https://2018.ares-conference.eu/ | |Homepage=https://2018.ares-conference.eu/ | ||
|City=Hamburg | |City=Hamburg | ||
|Country=Germany | |Country=Germany | ||
|Notification=2018/05/30 | |||
|Camera ready=2018/06/29 | |||
|has general chair=Mathias Fischer, Dominik Herrmann | |has general chair=Mathias Fischer, Dominik Herrmann | ||
|has program chair=Christian Doerr, Sebastian Schrittwieser | |has program chair=Christian Doerr, Sebastian Schrittwieser | ||
| Line 15: | Line 18: | ||
|Submitted papers=112 | |Submitted papers=112 | ||
|Accepted papers=25 | |Accepted papers=25 | ||
|Accepted short papers=12 | |||
|has Proceedings Link=https://dl.acm.org/doi/proceedings/10.1145/3230833#issue-downloads | |||
|has Proceedings DOI=https://doi.org/10.1145/3230833 | |||
|has Proceedings Bibliography=https://dl.acm.org/doi/proceedings/10.1145/3230833 | |||
}} | }} | ||
The 13th International Conference on Availability, Reliability and Security (ARES) 2018 | The 13th International Conference on Availability, Reliability and Security (ARES) 2018 | ||
| Line 20: | Line 27: | ||
==Topics== | ==Topics== | ||
* Authorization, Authentication, and Access Control | |||
* Availability, Dependability, and Resilience | |||
* Botnets and Botnet Monitoring | |||
* Business Continuity & Resilience | |||
* Cost/Benefit Analysis | |||
* Cryptography | |||
* Dependability Aspects for Special Applications | |||
* Dependability Aspects of e-Government | |||
* Dependability and Resilience in Open Source Software | |||
* Designing Security Requirements | |||
* Digital Forensics | |||
* E-Commerce Dependability | |||
* Identity Management | |||
* IPR of Security Technology | |||
* Incident Response and Prevention | |||
* Information Flow Control | |||
* Information Hiding and Steganography | |||
* Interoperability Aspects | |||
* Intrusion Detection and Fraud Detection | |||
* Legal Issues related to Security and Privacy | |||
* Mobile Security | |||
* Network and Organizational Vulnerability Analysis | |||
* Network Security | |||
* Privacy-Enhancing Technologies | |||
* Process based Security Models and Methods | |||
* Resilience and Security for Critical Infrastructures | |||
* Resilience of Computing Systems | |||
* Resilience, Security, and Privacy for Smart Grids | |||
* Resilience, Security, and Privacy for the Internet of Things | |||
* RFID Security and Privacy | |||
* Risk planning, Analysis & Awareness | |||
* Safety Critical Systems | |||
* Secure Enterprise Architectures | |||
* Security and Privacy for Ubiquitous Systems | |||
* Security and Privacy in E-Health | |||
* Security and Trust Management in P2P and Grid applications | |||
* Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications | |||
* Security and Usability | |||
* Security as Quality of Service | |||
* Security in Distributed Systems / Distributed Databases | |||
* Security in Electronic Payments | |||
* Security in Electronic Voting | |||
* Software Engineering of Dependable Systems | |||
* Software Security | |||
* Threats and Attack Modelling | |||
* Trusted Computing | |||
* Tools for Dependable System Design and Evaluation | |||
* Trust Models and Trust Management | |||
* Wireless Security | |||
==Important Dates== | ==Important Dates== | ||
Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)<br> | |||
Author Notification: May 30, 2018<br> | |||
Camera-ready: June 29, 2018<br> | |||
Conference: August 27 – August 30, 2018 | |||
Latest revision as of 09:20, 25 August 2020
| ARES 2018 | |
|---|---|
13th International Conference on Availability, Reliability and Security
| |
| Event in series | ARES |
| Dates | 2018/08/27 (iCal) - 2018/08/30 |
| Homepage: | https://2018.ares-conference.eu/ |
| Location | |
| Location: | Hamburg, Germany |
| Important dates | |
| Submissions: | 2018/03/16 |
| Notification: | 2018/05/30 |
| Camera ready due: | 2018/06/29 |
| Accepted short papers: | 12 |
| Papers: | Submitted 112 / Accepted 25 (22.3 %) |
| Committees | |
| General chairs: | Mathias Fischer, Dominik Herrmann |
| PC chairs: | Christian Doerr, Sebastian Schrittwieser |
| Workshop chairs: | Edgar Weippl |
| Keynote speaker: | Joan Daemen, Aleksandra Mileva, Peter Schneider |
| Table of Contents | |
The 13th International Conference on Availability, Reliability and Security (ARES) 2018
Topics
- Authorization, Authentication, and Access Control
- Availability, Dependability, and Resilience
- Botnets and Botnet Monitoring
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications
- Dependability Aspects of e-Government
- Dependability and Resilience in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding and Steganography
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues related to Security and Privacy
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security
- Privacy-Enhancing Technologies
- Process based Security Models and Methods
- Resilience and Security for Critical Infrastructures
- Resilience of Computing Systems
- Resilience, Security, and Privacy for Smart Grids
- Resilience, Security, and Privacy for the Internet of Things
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security and Privacy for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- Wireless Security
Important Dates
Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)
Author Notification: May 30, 2018
Camera-ready: June 29, 2018
Conference: August 27 – August 30, 2018