posted by system || 2181 views || tracked by 7 users: [display]

ARES 2008 : Third International Conference on Availability, Reliability and Security

FacebookTwitterLinkedInGoogle


Conference Series : Availability, Reliability and Security
 
Link: http://www.ares-conference.eu/conf/
 
When Mar 4, 2008 - Mar 7, 2008
Where Barcelona, Spain
Submission Deadline Oct 25, 2007
Categories    reliability   security
 

Call For Papers

Extended deadline: 2005 10 25

Call for Papers for the Third International Conference on Availability, Reliability and Security
ARES 2008 �?? The International Security and Dependability Conference

Click here to get the Text Version of the Call for Papers

Conference

The Third International Conference on Availability, Reliability and Security (�??ARES �?? The International Security and Dependability Conference�??) will bring together researchers and practitioners in the area of IT-Security and Dependability. ARES will highlight the various aspects of security �?? with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.



Important Dates

* Workshop Proposal: September, 20th 2007
* Notification of Acceptance of the Workshop Proposal: September, 30th 2007
* Submission Deadline: October, 25th 2007
* Author Notification: November, 25th 2007
* Author Registration: December, 15th 2007
* Proceedings Version: January, 15th 2008
* Conference: March, 4th - March, 7th 2008



Workshop Proposal

In conjunction with the ARES conference, a number of workshops will be organized. Workshop proposals should include the call for papers, the number of papers to be accepted, the contact person, etc. They are to be sent to the Workshop Organizing Committee Prof. Leonard Barolli ( barolli@fit.ac.jpThis e-mail address is being protected from spam bots, you need JavaScript enabled to view it ) by September, 20th 2007. Proceedings of the ARES workshops will be published by IEEE Computer Society Press.



Topics of interest include, but are not limited to:

* Process based Security Models andMethods
* Authorization and Authentication
* Availability and Reliability
* Common Criteria Protocol
* Cost/Benefit Analysis
* Cryptographic protocols
* Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
* Dependability Aspects of Electronic Government (e-Government)
* Dependability administration
* Dependability in Open Source Software
* Designing Business Models with security requirements
* Digital Forensics
* E-Commerce Dependability
* Failure Prevention
* IPR of Security Technology
* Incident Response and Prevention
* Information Flow Control
* Internet Dependability
* Interoperability aspects
* Intrusion Detection and Fraud Detection
* Legal issues
* Mobile Security
* Network Security



* Privacy-enhancing technologies
* RFID Security and Privacy
* Risk planning, analysis & awareness
* Safety Critical Systems
* Secure Enterprise Architectures
* Security Issues for Ubiquitous Systems
* Security and Privacy in E-Health
* Security and Trust Management in P2P and Grid applications
* Security and privacy issues for sensor networks, wireless/mobile devices and applications
* Security as Quality of Service
* Security in Distributed Systems / Distributed Databases
* Security in Electronic Payments
* Security in Electronic Voting
* Software Engineering of Dependable Systems
* Software Security
* Standards, Guidelines and Certification
* Survivability of Computing Systems
* Temporal Aspects of Dependability
* Trusted Computing
* Tools for Dependable System Design and Evaluation
* Trust Models and Trust Management
* VOIP/Wireless Security



Submission Guidelines

Authors are invited to submit research and application papers following the IEEE Computer Society Proceedings Manuscripts style: two columns, single-spaced, including figures and references, using 10 fonts, and number each page. You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page:

* http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html

Submission papers are classified into 3 categorizes (1) full paper (8 pages), (2) short paper (5 pages), and (3) poster (2 pages) representing original, previously unpublished work. Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition.

Contact author must provide the following information at the AReS web site: paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.

Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.

Related Resources

ARES 2017   The 12h International Conference on Availability, Reliability and Security
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ISSRE 2017   International Symposium on Software Reliability Engineering
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IoTBDS 2018   3rd International Conference on Internet of Things, Big Data and Security
ICRE - Ei 2017   2017 3rd International Conference on Reliability Engineering (ICRE 2017)--SCOPUS, Ei Compendex
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm