Difference between revisions of "ARES 2016"

From Openresearch
Jump to: navigation, search
Line 21: Line 21:
  
 
==Topics==
 
==Topics==
 +
* Authorization and Authentication
 +
* Availability and Reliability
 +
* Business Continuity & Resilience
 +
* Cost/Benefit Analysis
 +
* Cryptography
 +
* Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
 +
* Dependability Aspects of Electronic Government (e-Government)
 +
* Dependability Administration
 +
* Dependability in Open Source Software
 +
* Designing Security Requirements
 +
* Digital Forensics
 +
* E-Commerce Dependability
 +
* Failure Prevention
 +
* Identity Management
 +
* IPR of Security Technology
 +
* Incident Response and Prevention
 +
* Information Flow Control
 +
* Information Hiding
 +
* Internet Dependability
 +
* Interoperability Aspects
 +
* Intrusion Detection and Fraud Detection
 +
* Legal Issues
 +
* Mobile Security
 +
* Network and Organizational Vulnerability Analysis
 +
* Network Security Privacy-Enhancing Technologies
 +
* Process based Security Models and Methods
 +
* RFID Security and Privacy
 +
* Risk planning, Analysis & Awareness
 +
* Safety Critical Systems
 +
* Secure Enterprise Architectures
 +
* Security Issues for Ubiquitous Systems
 +
* Security and Privacy in E-Health
 +
* Security and Trust Management in P2P and Grid applications
 +
* Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
 +
* Security and Usability
 +
* Security as Quality of Service
 +
* Security in Distributed Systems / Distributed Databases
 +
* Security in Electronic Payments
 +
* Security in Electronic Voting
 +
* Software Engineering of Dependable Systems
 +
* Software Security
 +
* Standards, Guidelines and Certification
 +
* Survivability of Computing Systems
 +
* Temporal Aspects of Dependability
 +
* Threats and Attack Modelling
 +
* Trusted Computing
 +
* Tools for Dependable System Design and Evaluation
 +
* Trust Models and Trust Management
 +
* VOIP, Wireless Security
  
  

Revision as of 12:39, 25 August 2020

ARES 2016
11th International Conference on Availability, Reliability and Security
Event in series ARES
Dates 2016/08/31 (iCal) - 2016/09/02
Homepage: https://www.ares-conference.eu/ares2016/www.ares-conference.eu/conference/index.html
Location
Location: Salzburg, Austria
Loading map...

Important dates
Submissions: 2016/03/13
Notification: 2016/05/30
Camera ready due: 2016/06/24
Committees
General chairs: Dominik Engel
PC chairs: Stephen B. Wicker, Dominik Engel
Workshop chairs: Edgar Weippl
Keynote speaker: Bernhard Schölkopf, Negar Kiyavash
Table of Contents


The 11th International Conference on Availability, Reliability and Security (ARES) 2016


Topics

  • Authorization and Authentication
  • Availability and Reliability
  • Business Continuity & Resilience
  • Cost/Benefit Analysis
  • Cryptography
  • Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
  • Dependability Aspects of Electronic Government (e-Government)
  • Dependability Administration
  • Dependability in Open Source Software
  • Designing Security Requirements
  • Digital Forensics
  • E-Commerce Dependability
  • Failure Prevention
  • Identity Management
  • IPR of Security Technology
  • Incident Response and Prevention
  • Information Flow Control
  • Information Hiding
  • Internet Dependability
  • Interoperability Aspects
  • Intrusion Detection and Fraud Detection
  • Legal Issues
  • Mobile Security
  • Network and Organizational Vulnerability Analysis
  • Network Security Privacy-Enhancing Technologies
  • Process based Security Models and Methods
  • RFID Security and Privacy
  • Risk planning, Analysis & Awareness
  • Safety Critical Systems
  • Secure Enterprise Architectures
  • Security Issues for Ubiquitous Systems
  • Security and Privacy in E-Health
  • Security and Trust Management in P2P and Grid applications
  • Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
  • Security and Usability
  • Security as Quality of Service
  • Security in Distributed Systems / Distributed Databases
  • Security in Electronic Payments
  • Security in Electronic Voting
  • Software Engineering of Dependable Systems
  • Software Security
  • Standards, Guidelines and Certification
  • Survivability of Computing Systems
  • Temporal Aspects of Dependability
  • Threats and Attack Modelling
  • Trusted Computing
  • Tools for Dependable System Design and Evaluation
  • Trust Models and Trust Management
  • VOIP, Wireless Security


Submissions

Important Dates

Submission Deadline: March 13, 2016 extended to March 29, 2016 (23:59 UTC-11)
Author Notification: May 30, 2016
Camera-ready: June 24, 2016
Conference: August 31 – September 2, 2016