ARES 2015: Difference between revisions

From Openresearch
Jump to navigation Jump to search
No edit summary
No edit summary
Line 16: Line 16:


==Topics==
==Topics==
* Authorization and Authentication
* Availability and Reliability
* Business Continuity & Resilience
* Cost/Benefit Analysis
* Cryptography
* Dependability Aspects for Special Applications (e.g. ERP-Systems,
* Logistics)
* Dependability Aspects of Electronic Government (e-Government)
* Dependability Administration
* Dependability in Open Source Software
* Designing Security Requirements
* Digital Forensics
* E-Commerce Dependability
* Failure Prevention
* Identity Management
* IPR of Security Technology
* Incident Response and Prevention
* Information Flow Control
* Information Hiding
* Internet Dependability
* Interoperability Aspects
* Intrusion Detection and Fraud Detection
* Legal Issues
* Mobile Security
* Network and Organizational Vulnerability Analysis
* Network Security
* Privacy-Enhancing Technologies
* Process based Security Models and Methods
* RFID Security and Privacy
* Risk planning, Analysis & Awareness
* Safety Critical Systems
* Secure Enterprise Architectures
* Security Issues for Ubiquitous Systems
* Security and Privacy in E-Health
* Security and Trust Management in P2P and Grid applications
* Security and Privacy for Sensor Networks, Wireless/Mobile Devices
* and Applications
* Security and Usability
* Security as Quality of Service
* Security in Distributed Systems / Distributed Databases
* Security in Electronic Payments
* Security in Electronic Voting
* Software Engineering of Dependable Systems
* Software Security
* Standards, Guidelines and Certification
* Survivability of Computing Systems
* Temporal Aspects of Dependability
* Threats and Attack Modelling
* Trusted Computing
* Tools for Dependable System Design and Evaluation
* Trust Models and Trust Management
* VOIP, Wireless Security





Revision as of 09:44, 25 August 2020

ARES 2015
10th International Conference on Availability, Reliability and Security
Event in series ARES
Dates 2015/08/24 (iCal) - 2015/08/27
Homepage: https://www.ares-conference.eu/ares2015/www.ares-conference.eu/conference/index.html
Location
Location: Toulouse, France
Loading map...

Important dates
Submissions: 2015/03/02
Table of Contents


The 10th International Conference on Availability, Reliability and Security (ARES) 2015


Topics

  • Authorization and Authentication
  • Availability and Reliability
  • Business Continuity & Resilience
  • Cost/Benefit Analysis
  • Cryptography
  • Dependability Aspects for Special Applications (e.g. ERP-Systems,
  • Logistics)
  • Dependability Aspects of Electronic Government (e-Government)
  • Dependability Administration
  • Dependability in Open Source Software
  • Designing Security Requirements
  • Digital Forensics
  • E-Commerce Dependability
  • Failure Prevention
  • Identity Management
  • IPR of Security Technology
  • Incident Response and Prevention
  • Information Flow Control
  • Information Hiding
  • Internet Dependability
  • Interoperability Aspects
  • Intrusion Detection and Fraud Detection
  • Legal Issues
  • Mobile Security
  • Network and Organizational Vulnerability Analysis
  • Network Security
  • Privacy-Enhancing Technologies
  • Process based Security Models and Methods
  • RFID Security and Privacy
  • Risk planning, Analysis & Awareness
  • Safety Critical Systems
  • Secure Enterprise Architectures
  • Security Issues for Ubiquitous Systems
  • Security and Privacy in E-Health
  • Security and Trust Management in P2P and Grid applications
  • Security and Privacy for Sensor Networks, Wireless/Mobile Devices
  • and Applications
  • Security and Usability
  • Security as Quality of Service
  • Security in Distributed Systems / Distributed Databases
  • Security in Electronic Payments
  • Security in Electronic Voting
  • Software Engineering of Dependable Systems
  • Software Security
  • Standards, Guidelines and Certification
  • Survivability of Computing Systems
  • Temporal Aspects of Dependability
  • Threats and Attack Modelling
  • Trusted Computing
  • Tools for Dependable System Design and Evaluation
  • Trust Models and Trust Management
  • VOIP, Wireless Security


Submissions

Important Dates