Difference between revisions of "ARES 2013"
(Created page with "{{Event |Acronym=ARES 2013 |Title=8th International Conference on Availability, Reliability, and Security |Series=ARES |Type=Conference |Start date=2013/09/02 |End date=2013/0...") |
|||
Line 10: | Line 10: | ||
|Country=Germany | |Country=Germany | ||
}} | }} | ||
− | + | The 8th International Conference on Availability, Reliability and Security (ARES) 2013 | |
+ | |||
==Topics== | ==Topics== | ||
+ | * Authorization and Authentication | ||
+ | * Availability and Reliability | ||
+ | * Business Continuity & Resilience | ||
+ | * Cost/Benefit Analysis | ||
+ | * Cryptography | ||
+ | * Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics) | ||
+ | * Dependability Aspects of Electronic Government (e-Government) | ||
+ | * Dependability Administration | ||
+ | * Dependability in Open Source Software | ||
+ | * Designing Security Requirements | ||
+ | * Digital Forensics | ||
+ | * E-Commerce Dependability | ||
+ | * Failure Prevention | ||
+ | * Identity Management | ||
+ | * IPR of Security Technology | ||
+ | * Incident Response and Prevention | ||
+ | * Information Flow Control | ||
+ | * Information Hiding | ||
+ | * Internet Dependability | ||
+ | * Interoperability Aspects | ||
+ | * Intrusion Detection and Fraud Detection | ||
+ | * Legal Issues | ||
+ | * Mobile Security | ||
+ | * Network and Organizational Vulnerability Analysis | ||
+ | * Network Security | ||
+ | * Privacy-Enhancing Technologies | ||
+ | * Process based Security Models and Methods | ||
+ | * RFID Security and Privacy | ||
+ | * Risk planning, Analysis & Awareness | ||
+ | * Safety Critical Systems | ||
+ | * Secure Enterprise Architectures | ||
+ | * Security Issues for Ubiquitous Systems | ||
+ | * Security and Privacy in E-Health | ||
+ | * Security and Trust Management in P2P and Grid applications | ||
+ | * Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications | ||
+ | * Security and Usability | ||
+ | * Security as Quality of Service | ||
+ | * Security in Distributed Systems / Distributed Databases | ||
+ | * Security in Electronic Payments | ||
+ | * Security in Electronic Voting | ||
+ | * Software Engineering of Dependable Systems | ||
+ | * Software Security | ||
+ | * Standards, Guidelines and Certification | ||
+ | * Survivability of Computing Systems | ||
+ | * Temporal Aspects of Dependability | ||
+ | * Threats and Attack Modelling | ||
+ | * Trusted Computing | ||
+ | * Tools for Dependable System Design and Evaluation | ||
+ | * Trust Models and Trust Management | ||
+ | * VOIP, Wireless Security | ||
+ | |||
+ | |||
==Submissions== | ==Submissions== | ||
==Important Dates== | ==Important Dates== |
Revision as of 10:32, 21 August 2020
ARES 2013 | |
---|---|
8th International Conference on Availability, Reliability, and Security
| |
Event in series | ARES |
Dates | 2013/09/02 (iCal) - 2013/09/06 |
Homepage: | https://www.ares-conference.eu/ares2013/www.ares-conference.eu/conf/index.html |
Location | |
Location: | Regensburg, Germany |
Loading map... | |
Table of Contents | |
Contents | |
The 8th International Conference on Availability, Reliability and Security (ARES) 2013
Topics
- Authorization and Authentication
- Availability and Reliability
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
- Dependability Aspects of Electronic Government (e-Government)
- Dependability Administration
- Dependability in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Failure Prevention
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding
- Internet Dependability
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security
- Privacy-Enhancing Technologies
- Process based Security Models and Methods
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security Issues for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Standards, Guidelines and Certification
- Survivability of Computing Systems
- Temporal Aspects of Dependability
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- VOIP, Wireless Security
Submissions
Important Dates
Facts about "ARES 2013"
Acronym | ARES 2013 + |
End date | September 6, 2013 + |
Event in series | ARES + |
Event type | Conference + |
Has coordinates | 49° 1' 10", 12° 5' 51"Latitude: 49.019533333333 Longitude: 12.097486111111 + |
Has location city | Regensburg + |
Has location country | Category:Germany + |
Homepage | https://www.ares-conference.eu/ares2013/www.ares-conference.eu/conf/index.html + |
IsA | Event + |
Start date | September 2, 2013 + |
Title | 8th International Conference on Availability, Reliability, and Security + |