ARES 2015: Difference between revisions
No edit summary |
No edit summary |
||
| Line 16: | Line 16: | ||
==Topics== | ==Topics== | ||
* Authorization and Authentication | |||
* Availability and Reliability | |||
* Business Continuity & Resilience | |||
* Cost/Benefit Analysis | |||
* Cryptography | |||
* Dependability Aspects for Special Applications (e.g. ERP-Systems, | |||
* Logistics) | |||
* Dependability Aspects of Electronic Government (e-Government) | |||
* Dependability Administration | |||
* Dependability in Open Source Software | |||
* Designing Security Requirements | |||
* Digital Forensics | |||
* E-Commerce Dependability | |||
* Failure Prevention | |||
* Identity Management | |||
* IPR of Security Technology | |||
* Incident Response and Prevention | |||
* Information Flow Control | |||
* Information Hiding | |||
* Internet Dependability | |||
* Interoperability Aspects | |||
* Intrusion Detection and Fraud Detection | |||
* Legal Issues | |||
* Mobile Security | |||
* Network and Organizational Vulnerability Analysis | |||
* Network Security | |||
* Privacy-Enhancing Technologies | |||
* Process based Security Models and Methods | |||
* RFID Security and Privacy | |||
* Risk planning, Analysis & Awareness | |||
* Safety Critical Systems | |||
* Secure Enterprise Architectures | |||
* Security Issues for Ubiquitous Systems | |||
* Security and Privacy in E-Health | |||
* Security and Trust Management in P2P and Grid applications | |||
* Security and Privacy for Sensor Networks, Wireless/Mobile Devices | |||
* and Applications | |||
* Security and Usability | |||
* Security as Quality of Service | |||
* Security in Distributed Systems / Distributed Databases | |||
* Security in Electronic Payments | |||
* Security in Electronic Voting | |||
* Software Engineering of Dependable Systems | |||
* Software Security | |||
* Standards, Guidelines and Certification | |||
* Survivability of Computing Systems | |||
* Temporal Aspects of Dependability | |||
* Threats and Attack Modelling | |||
* Trusted Computing | |||
* Tools for Dependable System Design and Evaluation | |||
* Trust Models and Trust Management | |||
* VOIP, Wireless Security | |||
Revision as of 09:44, 25 August 2020
| ARES 2015 | |
|---|---|
10th International Conference on Availability, Reliability and Security
| |
| Event in series | ARES |
| Dates | 2015/08/24 (iCal) - 2015/08/27 |
| Homepage: | https://www.ares-conference.eu/ares2015/www.ares-conference.eu/conference/index.html |
| Location | |
| Location: | Toulouse, France |
| Important dates | |
| Submissions: | 2015/03/02 |
| Table of Contents | |
The 10th International Conference on Availability, Reliability and Security (ARES) 2015
Topics
- Authorization and Authentication
- Availability and Reliability
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications (e.g. ERP-Systems,
- Logistics)
- Dependability Aspects of Electronic Government (e-Government)
- Dependability Administration
- Dependability in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Failure Prevention
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding
- Internet Dependability
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security
- Privacy-Enhancing Technologies
- Process based Security Models and Methods
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security Issues for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices
- and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Standards, Guidelines and Certification
- Survivability of Computing Systems
- Temporal Aspects of Dependability
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- VOIP, Wireless Security