Difference between revisions of "ARES 2016"
Line 21: | Line 21: | ||
==Topics== | ==Topics== | ||
+ | * Authorization and Authentication | ||
+ | * Availability and Reliability | ||
+ | * Business Continuity & Resilience | ||
+ | * Cost/Benefit Analysis | ||
+ | * Cryptography | ||
+ | * Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics) | ||
+ | * Dependability Aspects of Electronic Government (e-Government) | ||
+ | * Dependability Administration | ||
+ | * Dependability in Open Source Software | ||
+ | * Designing Security Requirements | ||
+ | * Digital Forensics | ||
+ | * E-Commerce Dependability | ||
+ | * Failure Prevention | ||
+ | * Identity Management | ||
+ | * IPR of Security Technology | ||
+ | * Incident Response and Prevention | ||
+ | * Information Flow Control | ||
+ | * Information Hiding | ||
+ | * Internet Dependability | ||
+ | * Interoperability Aspects | ||
+ | * Intrusion Detection and Fraud Detection | ||
+ | * Legal Issues | ||
+ | * Mobile Security | ||
+ | * Network and Organizational Vulnerability Analysis | ||
+ | * Network Security Privacy-Enhancing Technologies | ||
+ | * Process based Security Models and Methods | ||
+ | * RFID Security and Privacy | ||
+ | * Risk planning, Analysis & Awareness | ||
+ | * Safety Critical Systems | ||
+ | * Secure Enterprise Architectures | ||
+ | * Security Issues for Ubiquitous Systems | ||
+ | * Security and Privacy in E-Health | ||
+ | * Security and Trust Management in P2P and Grid applications | ||
+ | * Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications | ||
+ | * Security and Usability | ||
+ | * Security as Quality of Service | ||
+ | * Security in Distributed Systems / Distributed Databases | ||
+ | * Security in Electronic Payments | ||
+ | * Security in Electronic Voting | ||
+ | * Software Engineering of Dependable Systems | ||
+ | * Software Security | ||
+ | * Standards, Guidelines and Certification | ||
+ | * Survivability of Computing Systems | ||
+ | * Temporal Aspects of Dependability | ||
+ | * Threats and Attack Modelling | ||
+ | * Trusted Computing | ||
+ | * Tools for Dependable System Design and Evaluation | ||
+ | * Trust Models and Trust Management | ||
+ | * VOIP, Wireless Security | ||
Revision as of 11:39, 25 August 2020
ARES 2016 | |
---|---|
11th International Conference on Availability, Reliability and Security
| |
Event in series | ARES |
Dates | 2016/08/31 (iCal) - 2016/09/02 |
Homepage: | https://www.ares-conference.eu/ares2016/www.ares-conference.eu/conference/index.html |
Location | |
Location: | Salzburg, Austria |
Loading map... | |
Important dates | |
Submissions: | 2016/03/13 |
Notification: | 2016/05/30 |
Camera ready due: | 2016/06/24 |
Committees | |
General chairs: | Dominik Engel |
PC chairs: | Stephen B. Wicker, Dominik Engel |
Workshop chairs: | Edgar Weippl |
Keynote speaker: | Bernhard Schölkopf, Negar Kiyavash |
Table of Contents | |
Contents | |
The 11th International Conference on Availability, Reliability and Security (ARES) 2016
Topics
- Authorization and Authentication
- Availability and Reliability
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
- Dependability Aspects of Electronic Government (e-Government)
- Dependability Administration
- Dependability in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Failure Prevention
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding
- Internet Dependability
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security Privacy-Enhancing Technologies
- Process based Security Models and Methods
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security Issues for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Standards, Guidelines and Certification
- Survivability of Computing Systems
- Temporal Aspects of Dependability
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- VOIP, Wireless Security
Submissions
Important Dates
Submission Deadline: March 13, 2016 extended to March 29, 2016 (23:59 UTC-11)
Author Notification: May 30, 2016
Camera-ready: June 24, 2016
Conference: August 31 – September 2, 2016
Facts about "ARES 2016"
Acceptance rate | 24.7 + |
Accepted papers | 21 + |
Acronym | ARES 2016 + |
Camera ready due | June 24, 2016 + |
End date | September 2, 2016 + |
Event in series | ARES + |
Event type | Conference + |
Has Keynote speaker | Bernhard Schölkopf + and Negar Kiyavash + |
Has Submitting link | https://easychair.org/conferences/?conf=ares2016 + |
Has coordinates | 47° 47' 53", 13° 2' 47"Latitude: 47.798133333333 Longitude: 13.046480555556 + |
Has general chair | Dominik Engel + |
Has location city | Salzburg + |
Has location country | Category:Austria + |
Has program chair | Stephen B. Wicker + and Dominik Engel + |
Has workshop chair | Edgar Weippl + |
Homepage | https://www.ares-conference.eu/ares2016/www.ares-conference.eu/conference/index.html + |
IsA | Event + |
Notification | May 30, 2016 + |
Start date | August 31, 2016 + |
Submission deadline | March 13, 2016 + |
Submitted papers | 85 + |
Title | 11th International Conference on Availability, Reliability and Security + |