| |||||||||||||||
AReS 2011 : The Sixth International Conference on Availability, Reliability and SecurityConference Series : Availability, Reliability and Security | |||||||||||||||
Link: http://www.ares-conference.eu/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Preliminary Call for Papers
The Sixth International Conference on Availability, Reliability and Security (AReS 2011) http://www.ares-conference.eu Vienna University of Technology, Austria August 22nd - 26th, 2011 Conference The 6th International Conference on Availability, Reliability and Security (“ARES – The International Security and Dependability Conference”) will bring together researchers and practitioners in the area of IT-Security and Dependability. ARES will highlight the various aspects of security – with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. Important Dates Workshop Proposal: Until February 1st, 2011 Workshop Proposal Notification: 2 weeks after submission of proposal Submission Deadline: February 21st, 2011 Author Notification: April 18th, 2011 Author Registration: June 1st, 2011 Proceedings Version: June 1st, 2011 Conference: August 22nd - 26th, 2011 Workshop Proposal for new workshops In conjunction with the ARES conference, a number of workshops will be organized. Workshop proposals should include the call for papers, the number of papers to be accepted, the contact person, etc. They are to be sent to the Workshop Organizing Committee (simon.tjoa[-@t@-]fhstp.ac.at). Topics of interest include, but are not limited to: Authorization and Authentication Availability and Reliability Business Continuity & Resilience Cost/Benefit Analysis Cryptography Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics) Dependability Aspects of Electronic Government (e-Government) Dependability Administration Dependability in Open Source Software Designing Security Requirements Digital Forensics E-Commerce Dependability Failure Prevention Identity Management IPR of Security Technology Incident Response and Prevention Information Flow Control Information Hiding Internet Dependability Interoperability Aspects Intrusion Detection and Fraud Detection Legal Issues Mobile Security Network and Organizational Vulnerability Analysis Network Security Privacy-Enhancing Technologies Process based Security Models and Methods RFID Security and Privacy Risk planning, Analysis & Awareness Safety Critical Systems Secure Enterprise Architectures Security Issues for Ubiquitous Systems Security and Privacy in E-Health Security and Trust Management in P2P and Grid applications Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications Security and Usability Security as Quality of Service Security in Distributed Systems / Distributed Databases Security in Electronic Payments Security in Electronic Voting Software Engineering of Dependable Systems Software Security Standards, Guidelines and Certification Survivability of Computing Systems Temporal Aspects of Dependability Threats and Attack Modelling Trusted Computing Tools for Dependable System Design and Evaluation Trust Models and Trust Management VOIP, Wireless Security Submission Guidelines: Authors are invited to submit research and application papers with the following Manuscripts style: two columns, single-spaced, including figures and references, using 10 fonts, and number each page. You can confirm the style at the following page: http://www2.computer.org/portal/web/cscps/formatting (information for authors) Submission papers are classified into 3 categorizes representing original, previously unpublished work. 1. full paper (8 pages) 2. short paper (6 pages) 3. workshop paper (6 pages) Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition. Contact author must provide the following information at the ARES conference system: paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference. |
|