Difference between revisions of "ARES 2018"

From Openresearch
Jump to: navigation, search
Line 23: Line 23:
  
 
==Topics==
 
==Topics==
 +
* Authorization, Authentication, and Access Control
 +
* Availability, Dependability, and Resilience
 +
* Botnets and Botnet Monitoring
 +
* Business Continuity & Resilience
 +
* Cost/Benefit Analysis
 +
* Cryptography
 +
* Dependability Aspects for Special Applications
 +
* Dependability Aspects of e-Government
 +
* Dependability and Resilience in Open Source Software
 +
* Designing Security Requirements
 +
* Digital Forensics
 +
* E-Commerce Dependability
 +
* Identity Management
 +
* IPR of Security Technology
 +
* Incident Response and Prevention
 +
* Information Flow Control
 +
* Information Hiding and Steganography
 +
* Interoperability Aspects
 +
* Intrusion Detection and Fraud Detection
 +
* Legal Issues related to Security and Privacy
 +
* Mobile Security
 +
* Network and Organizational Vulnerability Analysis
 +
* Network Security
 +
* Privacy-Enhancing Technologies
 +
* Process based Security Models and Methods
 +
* Resilience and Security for Critical Infrastructures 
 +
* Resilience of Computing Systems
 +
* Resilience, Security, and Privacy for Smart Grids
 +
* Resilience, Security, and Privacy for the Internet of Things
 +
* RFID Security and Privacy
 +
* Risk planning, Analysis & Awareness
 +
* Safety Critical Systems
 +
* Secure Enterprise Architectures
 +
* Security and Privacy for Ubiquitous Systems
 +
* Security and Privacy in E-Health
 +
* Security and Trust Management in P2P and Grid applications
 +
* Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
 +
* Security and Usability
 +
* Security as Quality of Service
 +
* Security in Distributed Systems / Distributed Databases
 +
* Security in Electronic Payments
 +
* Security in Electronic Voting
 +
* Software Engineering of Dependable Systems
 +
* Software Security
 +
* Threats and Attack Modelling
 +
* Trusted Computing
 +
* Tools for Dependable System Design and Evaluation
 +
* Trust Models and Trust Management
 +
* Wireless Security
  
  
Line 29: Line 78:
  
 
==Important Dates==
 
==Important Dates==
Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)
+
Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)<br>
Author Notification: May 30, 2018
+
Author Notification: May 30, 2018<br>
Camera-ready: June 29, 2018
+
Camera-ready: June 29, 2018<br>
 
Conference: August 27 – August 30, 2018
 
Conference: August 27 – August 30, 2018

Revision as of 10:16, 25 August 2020

ARES 2018
13th International Conference on Availability, Reliability and Security
Event in series ARES
Dates 2018/08/27 (iCal) - 2018/08/30
Homepage: https://2018.ares-conference.eu/
Location
Location: Hamburg, Germany
Loading map...

Important dates
Submissions: 2018/03/16
Notification: 2018/05/30
Camera ready due: 2018/06/29
Papers: Submitted 112 / Accepted 25 (22.3 %)
Committees
General chairs: Mathias Fischer, Dominik Herrmann
PC chairs: Christian Doerr, Sebastian Schrittwieser
Workshop chairs: Edgar Weippl
Keynote speaker: Joan Daemen, Aleksandra Mileva, Peter Schneider
Table of Contents


The 13th International Conference on Availability, Reliability and Security (ARES) 2018


Topics

  • Authorization, Authentication, and Access Control
  • Availability, Dependability, and Resilience
  • Botnets and Botnet Monitoring
  • Business Continuity & Resilience
  • Cost/Benefit Analysis
  • Cryptography
  • Dependability Aspects for Special Applications
  • Dependability Aspects of e-Government
  • Dependability and Resilience in Open Source Software
  • Designing Security Requirements
  • Digital Forensics
  • E-Commerce Dependability
  • Identity Management
  • IPR of Security Technology
  • Incident Response and Prevention
  • Information Flow Control
  • Information Hiding and Steganography
  • Interoperability Aspects
  • Intrusion Detection and Fraud Detection
  • Legal Issues related to Security and Privacy
  • Mobile Security
  • Network and Organizational Vulnerability Analysis
  • Network Security
  • Privacy-Enhancing Technologies
  • Process based Security Models and Methods
  • Resilience and Security for Critical Infrastructures
  • Resilience of Computing Systems
  • Resilience, Security, and Privacy for Smart Grids
  • Resilience, Security, and Privacy for the Internet of Things
  • RFID Security and Privacy
  • Risk planning, Analysis & Awareness
  • Safety Critical Systems
  • Secure Enterprise Architectures
  • Security and Privacy for Ubiquitous Systems
  • Security and Privacy in E-Health
  • Security and Trust Management in P2P and Grid applications
  • Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
  • Security and Usability
  • Security as Quality of Service
  • Security in Distributed Systems / Distributed Databases
  • Security in Electronic Payments
  • Security in Electronic Voting
  • Software Engineering of Dependable Systems
  • Software Security
  • Threats and Attack Modelling
  • Trusted Computing
  • Tools for Dependable System Design and Evaluation
  • Trust Models and Trust Management
  • Wireless Security


Submissions

Important Dates

Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)
Author Notification: May 30, 2018
Camera-ready: June 29, 2018
Conference: August 27 – August 30, 2018