Difference between revisions of "ARES 2018"

From Openresearch
Jump to: navigation, search
 
(2 intermediate revisions by the same user not shown)
Line 18: Line 18:
 
|Submitted papers=112
 
|Submitted papers=112
 
|Accepted papers=25
 
|Accepted papers=25
 +
|Accepted short papers=12
 +
|has Proceedings Link=https://dl.acm.org/doi/proceedings/10.1145/3230833#issue-downloads
 +
|has Proceedings DOI=https://doi.org/10.1145/3230833
 +
|has Proceedings Bibliography=https://dl.acm.org/doi/proceedings/10.1145/3230833
 
}}
 
}}
 
The 13th International Conference on Availability, Reliability and Security (ARES) 2018
 
The 13th International Conference on Availability, Reliability and Security (ARES) 2018
Line 72: Line 76:
 
* Trust Models and Trust Management  
 
* Trust Models and Trust Management  
 
* Wireless Security  
 
* Wireless Security  
 
 
==Submissions==
 
  
  

Latest revision as of 10:20, 25 August 2020

ARES 2018
13th International Conference on Availability, Reliability and Security
Event in series ARES
Dates 2018/08/27 (iCal) - 2018/08/30
Homepage: https://2018.ares-conference.eu/
Location
Location: Hamburg, Germany
Loading map...

Important dates
Submissions: 2018/03/16
Notification: 2018/05/30
Camera ready due: 2018/06/29
Accepted short papers: 12
Papers: Submitted 112 / Accepted 25 (22.3 %)
Committees
General chairs: Mathias Fischer, Dominik Herrmann
PC chairs: Christian Doerr, Sebastian Schrittwieser
Workshop chairs: Edgar Weippl
Keynote speaker: Joan Daemen, Aleksandra Mileva, Peter Schneider
Table of Contents


The 13th International Conference on Availability, Reliability and Security (ARES) 2018


Topics

  • Authorization, Authentication, and Access Control
  • Availability, Dependability, and Resilience
  • Botnets and Botnet Monitoring
  • Business Continuity & Resilience
  • Cost/Benefit Analysis
  • Cryptography
  • Dependability Aspects for Special Applications
  • Dependability Aspects of e-Government
  • Dependability and Resilience in Open Source Software
  • Designing Security Requirements
  • Digital Forensics
  • E-Commerce Dependability
  • Identity Management
  • IPR of Security Technology
  • Incident Response and Prevention
  • Information Flow Control
  • Information Hiding and Steganography
  • Interoperability Aspects
  • Intrusion Detection and Fraud Detection
  • Legal Issues related to Security and Privacy
  • Mobile Security
  • Network and Organizational Vulnerability Analysis
  • Network Security
  • Privacy-Enhancing Technologies
  • Process based Security Models and Methods
  • Resilience and Security for Critical Infrastructures
  • Resilience of Computing Systems
  • Resilience, Security, and Privacy for Smart Grids
  • Resilience, Security, and Privacy for the Internet of Things
  • RFID Security and Privacy
  • Risk planning, Analysis & Awareness
  • Safety Critical Systems
  • Secure Enterprise Architectures
  • Security and Privacy for Ubiquitous Systems
  • Security and Privacy in E-Health
  • Security and Trust Management in P2P and Grid applications
  • Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
  • Security and Usability
  • Security as Quality of Service
  • Security in Distributed Systems / Distributed Databases
  • Security in Electronic Payments
  • Security in Electronic Voting
  • Software Engineering of Dependable Systems
  • Software Security
  • Threats and Attack Modelling
  • Trusted Computing
  • Tools for Dependable System Design and Evaluation
  • Trust Models and Trust Management
  • Wireless Security


Important Dates

Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)
Author Notification: May 30, 2018
Camera-ready: June 29, 2018
Conference: August 27 – August 30, 2018