Difference between revisions of "ARES 2014"

From Openresearch
Jump to: navigation, search
(Created page with "{{Event |Acronym=ARES 2014 |Title=9th International Conference on Availability, Reliability and Security |Series=ARES |Type=Conference |Start date=2014/09/08 |End date=2014/09...")
 
 
(5 intermediate revisions by the same user not shown)
Line 6: Line 6:
 
|Start date=2014/09/08
 
|Start date=2014/09/08
 
|End date=2014/09/12
 
|End date=2014/09/12
 +
|Submission deadline=2014/03/07
 
|Homepage=https://www.ares-conference.eu/ares2014/www.ares-conference.eu/conference/index.html
 
|Homepage=https://www.ares-conference.eu/ares2014/www.ares-conference.eu/conference/index.html
 
|City=Freiburg
 
|City=Freiburg
 
|Country=Switzerland
 
|Country=Switzerland
 +
|Notification=2014/05/19
 +
|has general chair=Stephanie Teufel
 +
|has program chair=Edgar Weippl, Collin Mulliner
 +
|has Keynote speaker=Bart Preneel, Volkmar Lotz
 +
|Submitted papers=81
 +
|Accepted papers=13
 +
|has Proceedings DOI=https://doi.org/10.1109/ARES34489.2014
 +
|has Proceedings Bibliography=https://ieeexplore.ieee.org/xpl/conhome/6969844/proceeding
 
}}
 
}}
 
The 9th International Conference on Availability, Reliability and Security (ARES) 2014
 
The 9th International Conference on Availability, Reliability and Security (ARES) 2014
Line 14: Line 23:
  
 
==Topics==
 
==Topics==
 +
* Authorization and Authentication
 +
* Availability and Reliability
 +
* Business Continuity & Resilience
 +
* Cost/Benefit Analysis
 +
* Cryptography
 +
* Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
 +
* Dependability Aspects of Electronic Government (e-Government)
 +
* Dependability Administration
 +
* Dependability in Open Source Software
 +
* Designing Security Requirements
 +
* Digital Forensics
 +
* E-Commerce Dependability
 +
* Failure Prevention
 +
* Identity Management
 +
* IPR of Security Technology
 +
* Incident Response and Prevention
 +
* Information Flow Control
 +
* Information Hiding
 +
* Internet Dependability
 +
* Interoperability Aspects
 +
* Intrusion Detection and Fraud Detection
 +
* Legal Issues
 +
* Mobile Security
 +
* Network and Organizational Vulnerability Analysis
 +
* Network Security
 +
* Privacy-Enhancing Technologies
 +
* Process based Security Models and Methods
 +
* RFID Security and Privacy
 +
* Risk planning, Analysis & Awareness
 +
* Safety Critical Systems
 +
* Secure Enterprise Architectures
 +
* Security Issues for Ubiquitous Systems
 +
* Security and Privacy in E-Health
 +
* Security and Trust Management in P2P and Grid applications
 +
* Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
 +
* Security and Usability
 +
* Security as Quality of Service
 +
* Security in Distributed Systems / Distributed Databases
 +
* Security in Electronic Payments
 +
* Security in Electronic Voting
 +
* Software Engineering of Dependable Systems
 +
* Software Security
 +
* Standards, Guidelines and Certification
 +
* Survivability of Computing Systems
 +
* Temporal Aspects of Dependability
 +
* Threats and Attack Modelling
 +
* Trusted Computing
 +
* Tools for Dependable System Design and Evaluation
 +
* Trust Models and Trust Management
 +
* VOIP, Wireless Security
  
  
 
==Submissions==
 
==Submissions==
 +
Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.
 +
 +
For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:
 +
 +
*full paper (10 pages)
 +
*short paper (6 pages)
 +
*workshop paper (8 pages, a maximum of 10 pages is tolerated)
 +
*extended abstracts (2 pages, only possible in the ARES Industrial track)
 +
 +
Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.
 +
 +
Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.
 +
 +
Contact author must provide the following information at the ARES conference system: paper title, authors’ names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords.
 +
Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.
 +
 +
Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.
  
  
 
==Important Dates==
 
==Important Dates==
 +
Workshop Proposal: Until February 1st, 2014<br>
 +
Workshop Proposal Notification: 2 weeks after submission of proposal<br>
 +
Submission Deadline: March 7th, 2014 extended to March 19th, 2014<br>
 +
Author Notification: May 19th, 2014<br>
 +
Author Registration: June 10th, 2014<br>
 +
Proceedings Version: June 20th, 2014<br>
 +
Conference: September 8th – 12th, 2014<br>

Latest revision as of 10:52, 21 August 2020

ARES 2014
9th International Conference on Availability, Reliability and Security
Event in series ARES
Dates 2014/09/08 (iCal) - 2014/09/12
Homepage: https://www.ares-conference.eu/ares2014/www.ares-conference.eu/conference/index.html
Location
Location: Freiburg, Switzerland
Loading map...

Important dates
Submissions: 2014/03/07
Notification: 2014/05/19
Papers: Submitted 81 / Accepted 13 (16 %)
Committees
General chairs: Stephanie Teufel
PC chairs: Edgar Weippl, Collin Mulliner
Keynote speaker: Bart Preneel, Volkmar Lotz
Table of Contents


The 9th International Conference on Availability, Reliability and Security (ARES) 2014


Topics

  • Authorization and Authentication
  • Availability and Reliability
  • Business Continuity & Resilience
  • Cost/Benefit Analysis
  • Cryptography
  • Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
  • Dependability Aspects of Electronic Government (e-Government)
  • Dependability Administration
  • Dependability in Open Source Software
  • Designing Security Requirements
  • Digital Forensics
  • E-Commerce Dependability
  • Failure Prevention
  • Identity Management
  • IPR of Security Technology
  • Incident Response and Prevention
  • Information Flow Control
  • Information Hiding
  • Internet Dependability
  • Interoperability Aspects
  • Intrusion Detection and Fraud Detection
  • Legal Issues
  • Mobile Security
  • Network and Organizational Vulnerability Analysis
  • Network Security
  • Privacy-Enhancing Technologies
  • Process based Security Models and Methods
  • RFID Security and Privacy
  • Risk planning, Analysis & Awareness
  • Safety Critical Systems
  • Secure Enterprise Architectures
  • Security Issues for Ubiquitous Systems
  • Security and Privacy in E-Health
  • Security and Trust Management in P2P and Grid applications
  • Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
  • Security and Usability
  • Security as Quality of Service
  • Security in Distributed Systems / Distributed Databases
  • Security in Electronic Payments
  • Security in Electronic Voting
  • Software Engineering of Dependable Systems
  • Software Security
  • Standards, Guidelines and Certification
  • Survivability of Computing Systems
  • Temporal Aspects of Dependability
  • Threats and Attack Modelling
  • Trusted Computing
  • Tools for Dependable System Design and Evaluation
  • Trust Models and Trust Management
  • VOIP, Wireless Security


Submissions

Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.

For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:

  • full paper (10 pages)
  • short paper (6 pages)
  • workshop paper (8 pages, a maximum of 10 pages is tolerated)
  • extended abstracts (2 pages, only possible in the ARES Industrial track)

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.

Contact author must provide the following information at the ARES conference system: paper title, authors’ names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.

Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.


Important Dates

Workshop Proposal: Until February 1st, 2014
Workshop Proposal Notification: 2 weeks after submission of proposal
Submission Deadline: March 7th, 2014 extended to March 19th, 2014
Author Notification: May 19th, 2014
Author Registration: June 10th, 2014
Proceedings Version: June 20th, 2014
Conference: September 8th – 12th, 2014