Difference between revisions of "ARES 2019"
Jump to navigation
Jump to search
| Line 10: | Line 10: | ||
|City=Canterbury | |City=Canterbury | ||
|Country=UK | |Country=UK | ||
| + | |Has coordinator=Budi Arief | ||
| + | |has general chair=Shujun Li | ||
| + | |has program chair=Steve Furnell | ||
}} | }} | ||
The 14th International Conference on Availability, Reliability, and Security (ARES) 2019 | The 14th International Conference on Availability, Reliability, and Security (ARES) 2019 | ||
| Line 15: | Line 18: | ||
==Topics== | ==Topics== | ||
| + | * Authorization, Authentication, and Access Control | ||
| + | * Availability, Dependability, and Resilience | ||
| + | * Botnets and Botnet Monitoring | ||
| + | * Business Continuity & Resilience | ||
| + | * Cost/Benefit Analysis | ||
| + | * Cryptography | ||
| + | * Dependability Aspects for Special Applications | ||
| + | * Dependability Aspects of e-Government | ||
| + | * Dependability and Resilience in Open Source Software | ||
| + | * Designing Security Requirements | ||
| + | * Digital Forensics | ||
| + | * E-Commerce Dependability | ||
| + | * Identity Management | ||
| + | * IPR of Security Technology | ||
| + | * Incident Response and Prevention | ||
| + | * Information Flow Control | ||
| + | * Information Hiding and Steganography | ||
| + | * Interoperability Aspects | ||
| + | * Intrusion Detection and Fraud Detection | ||
| + | * Legal Issues related to Security and Privacy | ||
| + | * Mobile Security | ||
| + | * Network and Organizational Vulnerability Analysis | ||
| + | * Network Security | ||
| + | * Privacy-Enhancing Technologies | ||
| + | * Process based Security Models and Methods | ||
| + | * Resilience and Security for Critical Infrastructures | ||
| + | * Resilience of Computing Systems | ||
| + | * Resilience, Security, and Privacy for Smart Grids | ||
| + | * Resilience, Security, and Privacy for the Internet of Things | ||
| + | * RFID Security and Privacy | ||
| + | * Risk planning, Analysis & Awareness | ||
| + | * Safety Critical Systems | ||
| + | * Secure Enterprise Architectures | ||
| + | * Security and Privacy for Ubiquitous Systems | ||
| + | * Security and Privacy in E-Health | ||
| + | * Security and Trust Management in P2P and Grid applications | ||
| + | * Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications | ||
| + | * Security and Usability | ||
| + | * Security as Quality of Service | ||
| + | * Security in Distributed Systems / Distributed Databases | ||
| + | * Security in Electronic Payments | ||
| + | * Security in Electronic Voting | ||
| + | * Software Engineering of Dependable Systems | ||
| + | * Software Security | ||
| + | * Threats and Attack Modelling | ||
| + | * Trusted Computing | ||
| + | * Tools for Dependable System Design and Evaluation | ||
| + | * Trust Models and Trust Management | ||
| + | * Wireless Security | ||
Revision as of 11:51, 21 August 2020
| ARES 2019 | |
|---|---|
14th International Conference on Availability, Reliability, and Security
| |
| Event in series | ARES |
| Dates | 2019/08/26 (iCal) - 2019/08/29 |
| Homepage: | https://2019.ares-conference.eu/ |
| Location | |
| Location: | Canterbury, UK |
| Important dates | |
| Submissions: | 2019/03/30 |
| Committees | |
| Organizers: | Budi Arief |
| General chairs: | Shujun Li |
| PC chairs: | Steve Furnell |
| Table of Contents | |
The 14th International Conference on Availability, Reliability, and Security (ARES) 2019
Topics
- Authorization, Authentication, and Access Control
- Availability, Dependability, and Resilience
- Botnets and Botnet Monitoring
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications
- Dependability Aspects of e-Government
- Dependability and Resilience in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding and Steganography
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues related to Security and Privacy
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security
- Privacy-Enhancing Technologies
- Process based Security Models and Methods
- Resilience and Security for Critical Infrastructures
- Resilience of Computing Systems
- Resilience, Security, and Privacy for Smart Grids
- Resilience, Security, and Privacy for the Internet of Things
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security and Privacy for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- Wireless Security
Submissions
Important Dates
Submission Deadline: extended to March 30, 2019 (23:59 UTC-11) Author Notification: May 24, 2019 Author Registration: June 17, 2019 Proceedings Version: June 23, 2019 ARES EU Symposium: August 26, 2019 Conference: August 26 – August 29, 2019