Difference between revisions of "ARES 2018"
Jump to navigation
Jump to search
| Line 23: | Line 23: | ||
==Topics== | ==Topics== | ||
| + | * Authorization, Authentication, and Access Control | ||
| + | * Availability, Dependability, and Resilience | ||
| + | * Botnets and Botnet Monitoring | ||
| + | * Business Continuity & Resilience | ||
| + | * Cost/Benefit Analysis | ||
| + | * Cryptography | ||
| + | * Dependability Aspects for Special Applications | ||
| + | * Dependability Aspects of e-Government | ||
| + | * Dependability and Resilience in Open Source Software | ||
| + | * Designing Security Requirements | ||
| + | * Digital Forensics | ||
| + | * E-Commerce Dependability | ||
| + | * Identity Management | ||
| + | * IPR of Security Technology | ||
| + | * Incident Response and Prevention | ||
| + | * Information Flow Control | ||
| + | * Information Hiding and Steganography | ||
| + | * Interoperability Aspects | ||
| + | * Intrusion Detection and Fraud Detection | ||
| + | * Legal Issues related to Security and Privacy | ||
| + | * Mobile Security | ||
| + | * Network and Organizational Vulnerability Analysis | ||
| + | * Network Security | ||
| + | * Privacy-Enhancing Technologies | ||
| + | * Process based Security Models and Methods | ||
| + | * Resilience and Security for Critical Infrastructures | ||
| + | * Resilience of Computing Systems | ||
| + | * Resilience, Security, and Privacy for Smart Grids | ||
| + | * Resilience, Security, and Privacy for the Internet of Things | ||
| + | * RFID Security and Privacy | ||
| + | * Risk planning, Analysis & Awareness | ||
| + | * Safety Critical Systems | ||
| + | * Secure Enterprise Architectures | ||
| + | * Security and Privacy for Ubiquitous Systems | ||
| + | * Security and Privacy in E-Health | ||
| + | * Security and Trust Management in P2P and Grid applications | ||
| + | * Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications | ||
| + | * Security and Usability | ||
| + | * Security as Quality of Service | ||
| + | * Security in Distributed Systems / Distributed Databases | ||
| + | * Security in Electronic Payments | ||
| + | * Security in Electronic Voting | ||
| + | * Software Engineering of Dependable Systems | ||
| + | * Software Security | ||
| + | * Threats and Attack Modelling | ||
| + | * Trusted Computing | ||
| + | * Tools for Dependable System Design and Evaluation | ||
| + | * Trust Models and Trust Management | ||
| + | * Wireless Security | ||
| Line 29: | Line 78: | ||
==Important Dates== | ==Important Dates== | ||
| − | Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11) | + | Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)<br> |
| − | Author Notification: May 30, 2018 | + | Author Notification: May 30, 2018<br> |
| − | Camera-ready: June 29, 2018 | + | Camera-ready: June 29, 2018<br> |
Conference: August 27 – August 30, 2018 | Conference: August 27 – August 30, 2018 | ||
Revision as of 10:16, 25 August 2020
| ARES 2018 | |
|---|---|
13th International Conference on Availability, Reliability and Security
| |
| Event in series | ARES |
| Dates | 2018/08/27 (iCal) - 2018/08/30 |
| Homepage: | https://2018.ares-conference.eu/ |
| Location | |
| Location: | Hamburg, Germany |
| Important dates | |
| Submissions: | 2018/03/16 |
| Notification: | 2018/05/30 |
| Camera ready due: | 2018/06/29 |
| Papers: | Submitted 112 / Accepted 25 (22.3 %) |
| Committees | |
| General chairs: | Mathias Fischer, Dominik Herrmann |
| PC chairs: | Christian Doerr, Sebastian Schrittwieser |
| Workshop chairs: | Edgar Weippl |
| Keynote speaker: | Joan Daemen, Aleksandra Mileva, Peter Schneider |
| Table of Contents | |
The 13th International Conference on Availability, Reliability and Security (ARES) 2018
Topics
- Authorization, Authentication, and Access Control
- Availability, Dependability, and Resilience
- Botnets and Botnet Monitoring
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications
- Dependability Aspects of e-Government
- Dependability and Resilience in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding and Steganography
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues related to Security and Privacy
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security
- Privacy-Enhancing Technologies
- Process based Security Models and Methods
- Resilience and Security for Critical Infrastructures
- Resilience of Computing Systems
- Resilience, Security, and Privacy for Smart Grids
- Resilience, Security, and Privacy for the Internet of Things
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security and Privacy for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- Wireless Security
Submissions
Important Dates
Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)
Author Notification: May 30, 2018
Camera-ready: June 29, 2018
Conference: August 27 – August 30, 2018