ARES: Availability, Reliability and Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ARES 2016 International Conference on Availability, Reliability and Security
Aug 31, 2016 - Sep 2, 2016 Salzburg, Austria Mar 13, 2016
ARES 2015 The 10th International Conference on Availability, Reliability and Security
Aug 24, 2015 - Aug 28, 2015 Toulouse Mar 2, 2015
AReS 2014 The 9th International Conference on Availability, Reliability and Security (AReS 2014)
Sep 8, 2014 - Sep 12, 2014 University of Fribourg, Switzerland Mar 7, 2014
AReS 2013 The Eighth International Conference on Availability, Reliability and Security
Sep 2, 2013 - Sep 6, 2013 University of Regensburg, Germany Mar 1, 2013
ARES 2012 7th International Conference on Availability, Reliability and Security
Aug 20, 2012 - Aug 24, 2012 Prague Mar 28, 2012
AReS 2011 The Sixth International Conference on Availability, Reliability and Security
Aug 22, 2011 - Aug 26, 2011 Vienna, Austria Feb 21, 2011
ARES 2010 The Fifth International Conference on Availability, Reliability and Security
Feb 15, 2010 - Feb 18, 2010 Krakow, Poland Sep 1, 2009
ARES 2009 The Forth International Conference on Availability, Reliability and Security
Mar 16, 2009 - Mar 19, 2009 Fukuoka, Japan Oct 15, 2008
ARES 2008 Third International Conference on Availability, Reliability and Security
Mar 4, 2008 - Mar 7, 2008 Barcelona, Spain Oct 25, 2007
 
 

Present CFP : 2016

ARES 2016 - CALL FOR PAPERS

******************************************************************************************
The 11th International Conference on Availability, Reliability and Security (ARES 2016)
August 31 – September 2, 2016, Salzburg, Austria
http://www.ares-conference.eu
******************************************************************************************

***********
ARES CONFERENCE
************
The 11th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security.

ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.

ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.
Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals. The acceptance rate of the ARES 2015 conference was 29% (full papers only). The ARES conferences have been published by Conference Publishing Services (CPS).

************
CONFERENCE OFFICERS
************
General Chair
Dominik Engel, Salzburg University of Applied Sciences, Austria

Program Committee Chairs
Stephen B. Wicker, Cornell University, USA
Dominik Engel, Salzburg University of Applied Sciences, Austria

************
IMPORTANT DATES
************
Submission Deadline: March 13, 2016
Author Notification: May 30, 2016
Proceedings Version: June 20, 2016
Conference: August 31 - September 2, 2016

************
SUBMISSION
************
The proceedings of ARES (including workshops) have been published by Conference Publishing Services (CPS) of IEEE. Authors of selected papers that are accepted by and presented at the ARES Conference (including workshops) will be invited to submit an extended version to special issues of international journals.

Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.

For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:

full paper (10 pages)
short paper (6 pages)
workshop paper (8 pages, a maximum of 10 pages is tolerated)

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.

Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.

The ARES submission system (EasyChair) is available here: https://easychair.org/conferences/?conf=ares2016

************
PROGRAM COMMITTEE
************
Isaac Agudo, University of Malaga, Spain
Esma Aimeur, University of Montreal, Canada
Philipp Amann, Europol, EC3, Netherlands
Todd R. Andel, University of South Alabama, US
Amin Anjomshoaa, Massachusetts Institute of Technology (MIT), US
Francesco Buccafurri, University of Reggio Calabria, Italy
Luanne Burns Goldrich, The Johns Hopkins University Applied Physics Laboratory, US
Mario Cagalj, University of Split, Croatia
Jordi Castellà-Roca,Rovira i Virgili University of Tarragona, Spain
Lorenzo Cavallaro, Royal Holloway, University of London, UK
David Chadwick, University of Kent, UK
Soon Ae Chun, City University of New York, US
Nathan Clarke, Plymouth University, UK
Marijke Coetzee, University of Johannesburg, South Africa
Mark Dillon, International Criminal Court, NL
Adam Doupé, Arizona State University, US
Pavlos Efraimidis, Democritus University of Thrace, Greece
Christian Engelmann, Oak Ridge National Laboratory, US
Karl M. Goeschka, Vienna University of Technology, Austria
Luis Enrique Sánchez Crespo, University of Castilla-la Mancha, Spain
Zekeriya Erkin, TU Delft, Netherlands
Aristide Fattori, Università degli Studi di Milano, Italy
Hannes Federrath, University of Hamburg, Germany
Christophe Feltus, Luxembourg Institute of Science and Technology, Luxembourg
José Maria de Fuentes, Carlos III University of Madrid, Spain
Steven Furnell, Plymouth University, UK
Nico Golde, Qualcomm Research Germany, Germany
Bogdan Groza, Politehnica University of Timisoara, Romania
Dominik Herrmann, University Hamburg, Germany
Martin Gilje Jaatun, SINTEF, Norway
Hai Jin, Huazhong University of Science and Technology, China
Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany
Sokratis K. Katsikas, University of Piraeus, Greece
Peter Kieseberg, SBA Research, Austria
Ezzat Kirmani, St. Cloud State University, US
Thomas Korak, TU Graz, Austria
Thorsten Kramp, IBM Research Zurich, Switzerland
Ralf Kuesters, University of Trier, Germany
Costas Lambrinoudakis, University of Piraeus, Greece
Shujun Li University of Surrey, UK
Giovanni Livraga, Universita‘ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Konstantinos Markantonakis, Royal Holloway, University of London, UK
Keith Martin, Royal Holloway, University of London, UK
Ioannis Mavridis, University of Macedonia, Greece
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Jeffrey McDonald, University of South Alabama, US
Mattia Monga, Universita` degli Studi di Milano, Italy
Haralambos Mouratidis, University of Brighton, UK
Thomas Moyer, MIT Lincoln Laboratory, US
Alexios Mylonas, Staffordshire University, UK
Thomas Nowey, Krones AG, Germany
Christoforos Ntantogian, University of Piraeus, Greece
Rolf Oppliger, eSECURITY Technologies, Switzerland
Jaehong Park, University of Alabama in Huntsville, US
Günther Pernul, University of Regensburg, Germany
Andreas Peter, University of Twente, Netherlands
Sriram Raghavan, Secure Cyber Space, Australia
Stefanie Rinderle-Ma, Vienna University, Austria
Stefanie Roos, TU Dresden, Germany
Domenico Rosaci, University „Mediterranea“ of Reggio Calabria, Italy
Volker Roth, Freie Universität Berlin, Germany
Giovanni Russello, University of Auckland, New Zealand
Mark Scanlon, University College Dublin, Ireland
Sebastian Schinzel, FH Münster, Germany
Jörn-Marc Schmidt, secunet, Germany
Max Schuchard, University of Minnesota, US
Stefan Schulte Vienna University of Technology, Austria
Dimitris Simos, SBA Research, Austria
Jon A. Solworth, University of Illinois at Chicago, US
Mark Strembeck, WU Vienna, Austria
Jakub Szefer, Yale School of Engineering & Applied Science, US
Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany
Simon Tjoa, St. Pölten University of Applied Sciences, Austria
Andreas Unterweger, Salzburg University of Applied Sciences, Austria
Umberto Villano, Universita‘ del Sannio, Italy
Artemios Voyiatzis, SBA Research, Austria
Xiao Wang, Carnegie Mellon University, US
Jinpeng Wei, Florida International University, US
Christos Xenakis, University of Piraeus, Greece
Fabian Yamaguchi, Göttingen University, Germany
Alec Yasinsac, University of South Alabama, US
Nicola Zannone, Eindhoven University of Technology, Netherlands

***********
TOPCIS of interest include, but are not limited to:
************
Authorization and Authentication
Availability and Reliability
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
Dependability Aspects of Electronic Government (e-Government)
Dependability Administration
Dependability in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Failure Prevention
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding
Internet Dependability
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security Privacy-Enhancing Technologies
Process based Security Models and Methods
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security Issues for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Standards, Guidelines and Certification
Survivability of Computing Systems
Temporal Aspects of Dependability
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
VOIP, Wireless Security
 

Related Resources

IEEE SC 2016   The 6th IEEE International Symposium on Cloud and Service Computing
ACISP 2017   Australasian Conference on Information Security and Privacy
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security
BDCloud 2017   The 7th IEEE International Conference on Big Data and Cloud Computing
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing