posted by user: vslatten || 12038 views || tracked by 44 users: [display]

AReS 2011 : The Sixth International Conference on Availability, Reliability and Security


Conference Series : Availability, Reliability and Security
When Aug 22, 2011 - Aug 26, 2011
Where Vienna, Austria
Submission Deadline Feb 21, 2011
Notification Due Apr 18, 2011
Final Version Due Jun 1, 2011
Categories    availability   reliability   security

Call For Papers

Preliminary Call for Papers
The Sixth International Conference on Availability, Reliability and Security (AReS 2011)
Vienna University of Technology, Austria
August 22nd - 26th, 2011


The 6th International Conference on Availability, Reliability and Security (“ARES – The International Security and Dependability Conference”) will bring together researchers and practitioners in the area of IT-Security and Dependability. ARES will highlight the various aspects of security – with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.

Important Dates

Workshop Proposal: Until February 1st, 2011
Workshop Proposal Notification: 2 weeks after submission of proposal
Submission Deadline: February 21st, 2011
Author Notification: April 18th, 2011
Author Registration: June 1st, 2011
Proceedings Version: June 1st, 2011
Conference: August 22nd - 26th, 2011

Workshop Proposal for new workshops

In conjunction with the ARES conference, a number of workshops will be organized.
Workshop proposals should include the call for papers, the number of papers to be accepted,
the contact person, etc. They are to be sent to the Workshop Organizing Committee (simon.tjoa[-@t@-]

Topics of interest include, but are not limited to:

Authorization and Authentication
Availability and Reliability
Business Continuity & Resilience
Cost/Benefit Analysis
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
Dependability Aspects of Electronic Government (e-Government)
Dependability Administration
Dependability in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Failure Prevention
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding
Internet Dependability
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security

Privacy-Enhancing Technologies
Process based Security Models and Methods
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security Issues for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Standards, Guidelines and Certification
Survivability of Computing Systems
Temporal Aspects of Dependability
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
VOIP, Wireless Security

Submission Guidelines:

Authors are invited to submit research and application papers with the following Manuscripts style: two columns, single-spaced, including figures and references, using 10 fonts, and number each page. You can confirm the style at the following page: (information for authors)

Submission papers are classified into 3 categorizes representing original, previously unpublished work.

1. full paper (8 pages)
2. short paper (6 pages)
3. workshop paper (6 pages)

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.
Contact author must provide the following information at the ARES conference system: paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.

Related Resources

ARES 2018   International Conference on Availability, Reliability and Security
ACII 2018   Advanced Computational Intelligence: An International Journal
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
FARES 2018   13th International Workshop on Frontiers in Availability, Reliability and Security
PRDC 2018   The 23rd IEEE Pacific Rim International Symposium on Dependable Computing
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
SAFECOMP 2018   The 37th International Conference on Computer Safety, Reliability and Security
IJRAP 2018   International Journal of Recent advances in Physics
CloudCom 2018   The 10th IEEE International Conference on Cloud Computing Technology and Science