Difference between revisions of "ARES 2015"
Line 16: | Line 16: | ||
==Topics== | ==Topics== | ||
+ | * Authorization and Authentication | ||
+ | * Availability and Reliability | ||
+ | * Business Continuity & Resilience | ||
+ | * Cost/Benefit Analysis | ||
+ | * Cryptography | ||
+ | * Dependability Aspects for Special Applications (e.g. ERP-Systems, | ||
+ | * Logistics) | ||
+ | * Dependability Aspects of Electronic Government (e-Government) | ||
+ | * Dependability Administration | ||
+ | * Dependability in Open Source Software | ||
+ | * Designing Security Requirements | ||
+ | * Digital Forensics | ||
+ | * E-Commerce Dependability | ||
+ | * Failure Prevention | ||
+ | * Identity Management | ||
+ | * IPR of Security Technology | ||
+ | * Incident Response and Prevention | ||
+ | * Information Flow Control | ||
+ | * Information Hiding | ||
+ | * Internet Dependability | ||
+ | * Interoperability Aspects | ||
+ | * Intrusion Detection and Fraud Detection | ||
+ | * Legal Issues | ||
+ | * Mobile Security | ||
+ | * Network and Organizational Vulnerability Analysis | ||
+ | * Network Security | ||
+ | * Privacy-Enhancing Technologies | ||
+ | * Process based Security Models and Methods | ||
+ | * RFID Security and Privacy | ||
+ | * Risk planning, Analysis & Awareness | ||
+ | * Safety Critical Systems | ||
+ | * Secure Enterprise Architectures | ||
+ | * Security Issues for Ubiquitous Systems | ||
+ | * Security and Privacy in E-Health | ||
+ | * Security and Trust Management in P2P and Grid applications | ||
+ | * Security and Privacy for Sensor Networks, Wireless/Mobile Devices | ||
+ | * and Applications | ||
+ | * Security and Usability | ||
+ | * Security as Quality of Service | ||
+ | * Security in Distributed Systems / Distributed Databases | ||
+ | * Security in Electronic Payments | ||
+ | * Security in Electronic Voting | ||
+ | * Software Engineering of Dependable Systems | ||
+ | * Software Security | ||
+ | * Standards, Guidelines and Certification | ||
+ | * Survivability of Computing Systems | ||
+ | * Temporal Aspects of Dependability | ||
+ | * Threats and Attack Modelling | ||
+ | * Trusted Computing | ||
+ | * Tools for Dependable System Design and Evaluation | ||
+ | * Trust Models and Trust Management | ||
+ | * VOIP, Wireless Security | ||
Revision as of 10:44, 25 August 2020
ARES 2015 | |
---|---|
10th International Conference on Availability, Reliability and Security
| |
Event in series | ARES |
Dates | 2015/08/24 (iCal) - 2015/08/27 |
Homepage: | https://www.ares-conference.eu/ares2015/www.ares-conference.eu/conference/index.html |
Location | |
Location: | Toulouse, France |
Loading map... | |
Important dates | |
Submissions: | 2015/03/02 |
Table of Contents | |
Contents | |
The 10th International Conference on Availability, Reliability and Security (ARES) 2015
Topics
- Authorization and Authentication
- Availability and Reliability
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications (e.g. ERP-Systems,
- Logistics)
- Dependability Aspects of Electronic Government (e-Government)
- Dependability Administration
- Dependability in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Failure Prevention
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding
- Internet Dependability
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security
- Privacy-Enhancing Technologies
- Process based Security Models and Methods
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security Issues for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices
- and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Standards, Guidelines and Certification
- Survivability of Computing Systems
- Temporal Aspects of Dependability
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- VOIP, Wireless Security
Submissions
Important Dates
Facts about "ARES 2015"
Acronym | ARES 2015 + |
End date | August 27, 2015 + |
Event in series | ARES + |
Event type | Conference + |
Has coordinates | 43° 36' 16", 1° 26' 39"Latitude: 43.604461111111 Longitude: 1.4442472222222 + |
Has location city | Toulouse + |
Has location country | Category:France + |
Homepage | https://www.ares-conference.eu/ares2015/www.ares-conference.eu/conference/index.html + |
IsA | Event + |
Start date | August 24, 2015 + |
Submission deadline | March 2, 2015 + |
Title | 10th International Conference on Availability, Reliability and Security + |