ARES 2019: Difference between revisions
No edit summary |
No edit summary |
||
| Line 10: | Line 10: | ||
|City=Canterbury | |City=Canterbury | ||
|Country=UK | |Country=UK | ||
|Has coordinator=Budi Arief | |||
|has general chair=Shujun Li | |||
|has program chair=Steve Furnell | |||
}} | }} | ||
The 14th International Conference on Availability, Reliability, and Security (ARES) 2019 | The 14th International Conference on Availability, Reliability, and Security (ARES) 2019 | ||
| Line 15: | Line 18: | ||
==Topics== | ==Topics== | ||
* Authorization, Authentication, and Access Control | |||
* Availability, Dependability, and Resilience | |||
* Botnets and Botnet Monitoring | |||
* Business Continuity & Resilience | |||
* Cost/Benefit Analysis | |||
* Cryptography | |||
* Dependability Aspects for Special Applications | |||
* Dependability Aspects of e-Government | |||
* Dependability and Resilience in Open Source Software | |||
* Designing Security Requirements | |||
* Digital Forensics | |||
* E-Commerce Dependability | |||
* Identity Management | |||
* IPR of Security Technology | |||
* Incident Response and Prevention | |||
* Information Flow Control | |||
* Information Hiding and Steganography | |||
* Interoperability Aspects | |||
* Intrusion Detection and Fraud Detection | |||
* Legal Issues related to Security and Privacy | |||
* Mobile Security | |||
* Network and Organizational Vulnerability Analysis | |||
* Network Security | |||
* Privacy-Enhancing Technologies | |||
* Process based Security Models and Methods | |||
* Resilience and Security for Critical Infrastructures | |||
* Resilience of Computing Systems | |||
* Resilience, Security, and Privacy for Smart Grids | |||
* Resilience, Security, and Privacy for the Internet of Things | |||
* RFID Security and Privacy | |||
* Risk planning, Analysis & Awareness | |||
* Safety Critical Systems | |||
* Secure Enterprise Architectures | |||
* Security and Privacy for Ubiquitous Systems | |||
* Security and Privacy in E-Health | |||
* Security and Trust Management in P2P and Grid applications | |||
* Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications | |||
* Security and Usability | |||
* Security as Quality of Service | |||
* Security in Distributed Systems / Distributed Databases | |||
* Security in Electronic Payments | |||
* Security in Electronic Voting | |||
* Software Engineering of Dependable Systems | |||
* Software Security | |||
* Threats and Attack Modelling | |||
* Trusted Computing | |||
* Tools for Dependable System Design and Evaluation | |||
* Trust Models and Trust Management | |||
* Wireless Security | |||
Revision as of 10:51, 21 August 2020
| ARES 2019 | |
|---|---|
14th International Conference on Availability, Reliability, and Security
| |
| Event in series | ARES |
| Dates | 2019/08/26 (iCal) - 2019/08/29 |
| Homepage: | https://2019.ares-conference.eu/ |
| Location | |
| Location: | Canterbury, UK |
| Important dates | |
| Submissions: | 2019/03/30 |
| Committees | |
| Organizers: | Budi Arief |
| General chairs: | Shujun Li |
| PC chairs: | Steve Furnell |
| Table of Contents | |
The 14th International Conference on Availability, Reliability, and Security (ARES) 2019
Topics
- Authorization, Authentication, and Access Control
- Availability, Dependability, and Resilience
- Botnets and Botnet Monitoring
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications
- Dependability Aspects of e-Government
- Dependability and Resilience in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding and Steganography
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues related to Security and Privacy
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security
- Privacy-Enhancing Technologies
- Process based Security Models and Methods
- Resilience and Security for Critical Infrastructures
- Resilience of Computing Systems
- Resilience, Security, and Privacy for Smart Grids
- Resilience, Security, and Privacy for the Internet of Things
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security and Privacy for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- Wireless Security
Submissions
Important Dates
Submission Deadline: extended to March 30, 2019 (23:59 UTC-11) Author Notification: May 24, 2019 Author Registration: June 17, 2019 Proceedings Version: June 23, 2019 ARES EU Symposium: August 26, 2019 Conference: August 26 – August 29, 2019