posted by user: vslatten || 17681 views || tracked by 44 users: [display]

AReS 2011 : The Sixth International Conference on Availability, Reliability and Security

FacebookTwitterLinkedInGoogle


Conference Series : Availability, Reliability and Security
 
Link: http://www.ares-conference.eu/
 
When Aug 22, 2011 - Aug 26, 2011
Where Vienna, Austria
Submission Deadline Feb 21, 2011
Notification Due Apr 18, 2011
Final Version Due Jun 1, 2011
Categories    availability   reliability   security
 

Call For Papers

Preliminary Call for Papers
The Sixth International Conference on Availability, Reliability and Security (AReS 2011)

http://www.ares-conference.eu
Vienna University of Technology, Austria
August 22nd - 26th, 2011


Conference

The 6th International Conference on Availability, Reliability and Security (“ARES – The International Security and Dependability Conference”) will bring together researchers and practitioners in the area of IT-Security and Dependability. ARES will highlight the various aspects of security – with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.


Important Dates

Workshop Proposal: Until February 1st, 2011
Workshop Proposal Notification: 2 weeks after submission of proposal
Submission Deadline: February 21st, 2011
Author Notification: April 18th, 2011
Author Registration: June 1st, 2011
Proceedings Version: June 1st, 2011
Conference: August 22nd - 26th, 2011


Workshop Proposal for new workshops

In conjunction with the ARES conference, a number of workshops will be organized.
Workshop proposals should include the call for papers, the number of papers to be accepted,
the contact person, etc. They are to be sent to the Workshop Organizing Committee (simon.tjoa[-@t@-]fhstp.ac.at).


Topics of interest include, but are not limited to:

Authorization and Authentication
Availability and Reliability
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
Dependability Aspects of Electronic Government (e-Government)
Dependability Administration
Dependability in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Failure Prevention
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding
Internet Dependability
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security



Privacy-Enhancing Technologies
Process based Security Models and Methods
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security Issues for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Standards, Guidelines and Certification
Survivability of Computing Systems
Temporal Aspects of Dependability
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
VOIP, Wireless Security


Submission Guidelines:

Authors are invited to submit research and application papers with the following Manuscripts style: two columns, single-spaced, including figures and references, using 10 fonts, and number each page. You can confirm the style at the following page:

http://www2.computer.org/portal/web/cscps/formatting (information for authors)

Submission papers are classified into 3 categorizes representing original, previously unpublished work.

1. full paper (8 pages)
2. short paper (6 pages)
3. workshop paper (6 pages)

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.
Contact author must provide the following information at the ARES conference system: paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.


Related Resources

ARES 2024   International Conference on Availability, Reliability and Security
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
QRS 2024   The 24th IEEE International Conference on Software Quality, Reliability, and Security
AIFU 2024   10th International Conference on Artificial Intelligence and Applications
SafeComp 2024   43rd International Conference on Computer Safety, Reliability and Security
CIoT 2024   6th International Conference on Internet of Things
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)