posted by user: vslatten || 11498 views || tracked by 44 users: [display]

AReS 2011 : The Sixth International Conference on Availability, Reliability and Security

FacebookTwitterLinkedInGoogle


Conference Series : Availability, Reliability and Security
 
Link: http://www.ares-conference.eu/
 
When Aug 22, 2011 - Aug 26, 2011
Where Vienna, Austria
Submission Deadline Feb 21, 2011
Notification Due Apr 18, 2011
Final Version Due Jun 1, 2011
Categories    availability   reliability   security
 

Call For Papers

Preliminary Call for Papers
The Sixth International Conference on Availability, Reliability and Security (AReS 2011)

http://www.ares-conference.eu
Vienna University of Technology, Austria
August 22nd - 26th, 2011


Conference

The 6th International Conference on Availability, Reliability and Security (“ARES – The International Security and Dependability Conference”) will bring together researchers and practitioners in the area of IT-Security and Dependability. ARES will highlight the various aspects of security – with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.


Important Dates

Workshop Proposal: Until February 1st, 2011
Workshop Proposal Notification: 2 weeks after submission of proposal
Submission Deadline: February 21st, 2011
Author Notification: April 18th, 2011
Author Registration: June 1st, 2011
Proceedings Version: June 1st, 2011
Conference: August 22nd - 26th, 2011


Workshop Proposal for new workshops

In conjunction with the ARES conference, a number of workshops will be organized.
Workshop proposals should include the call for papers, the number of papers to be accepted,
the contact person, etc. They are to be sent to the Workshop Organizing Committee (simon.tjoa[-@t@-]fhstp.ac.at).


Topics of interest include, but are not limited to:

Authorization and Authentication
Availability and Reliability
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
Dependability Aspects of Electronic Government (e-Government)
Dependability Administration
Dependability in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Failure Prevention
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding
Internet Dependability
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security



Privacy-Enhancing Technologies
Process based Security Models and Methods
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security Issues for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Standards, Guidelines and Certification
Survivability of Computing Systems
Temporal Aspects of Dependability
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
VOIP, Wireless Security


Submission Guidelines:

Authors are invited to submit research and application papers with the following Manuscripts style: two columns, single-spaced, including figures and references, using 10 fonts, and number each page. You can confirm the style at the following page:

http://www2.computer.org/portal/web/cscps/formatting (information for authors)

Submission papers are classified into 3 categorizes representing original, previously unpublished work.

1. full paper (8 pages)
2. short paper (6 pages)
3. workshop paper (6 pages)

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.
Contact author must provide the following information at the ARES conference system: paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.


Related Resources

ARES 2017   The 12h International Conference on Availability, Reliability and Security
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ISSRE 2017   International Symposium on Software Reliability Engineering
IJCSITY 2017   International Journal of Computational Science and Information Technology
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
eCrime 2018   13th Symposium on Electronic Crime Research