ARES 2009

From ConfIDent
Deadlines
2008-11-20
2008-10-15
15
Oct
2008
Submission
20
Nov
2008
Notification
organization
Metrics
Submitted Papers
160
Accepted Papers
40
Venue

Fukuoka Institute of Technology, Fukuoka, Japan

Loading map...
ARES 2009 : The Forth International Conference on
Availability, Reliability and Security (AReS 2009)

http://www.ares-conference.eu
March, 16th - March, 19th 2009, Fukuoka, Japan

The Forth International Conference on Availability, Reliability and Security (?ARES ? The International Security and Dependability Conference?) will bring together researchers and practitioners in the area of IT-Security and Dependability. ARES will highlight the various aspects of security ? with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.

Important Dates

Workshop Proposal: June, 20th 2008
Notification (Workshop Proposal): June, 30th 2008
Submission Deadline: September, 30th 2008, Extended October 15, 2008
Author Notification: November, 20th 2008
Author Registration: November, 30th 2008
Proceedings Version: December, 15th 2008
Conference: March, 16th - March, 19th 2009
Workshop Proposal

In conjunction with the ARES conference, a number of workshops will be organized.
Workshop proposals should include the call for papers, the number of papers to be accepted,
the contact person, etc. They are to be sent to the Workshop Organizing Committee (ares-workshop[at]securityresearch.at).

Proceedings of the ARES workshops will be published by IEEE Computer Society Press.
Topics of interest include, but are not limited to:

-Authorization and Authentication
-Availability and Reliability
-Cost/Benefit Analysis
-Cryptography
-Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
-Dependability Aspects of Electronic Government (e-Government)
-Dependability Administration
-Dependability in Open Source Software
-Designing Security Requirements
-Digital Forensics
-E-Commerce Dependability
-Failure Prevention
-Identity Management
-IPR of Security Technology
-Incident Response and Prevention
-Information Flow Control
-Internet Dependability
-Interoperability Aspects
-Intrusion Detection and Fraud Detection
-Legal Issues
-Mobile Security
-Network and Organizational Vulnerability Analysis
-Network Security
-Privacy-Enhancing Technologies 	 	
-Process based Security Models and Methods
-RFID Security and Privacy
-Risk planning, Analysis & Awareness
-Safety Critical Systems
-Secure Enterprise Architectures
-Security Issues for Ubiquitous Systems
-Security and Privacy in E-Health
-Security and Trust Management in P2P and Grid applications
-Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
-Security and Usability
-Security as Quality of Service
-Security in Distributed Systems / Distributed Databases
-Security in Electronic Payments
-Security in Electronic Voting
-Software Engineering of Dependable Systems
-Software Security
-Standards, Guidelines and Certification
-Survivability of Computing Systems
-Temporal Aspects of Dependability
-Threats and Attack Modelling
-Trusted Computing
-Tools for Dependable System Design and Evaluation
-Trust Models and Trust Management
-VOIP, Wireless Security 
	

This CfP was obtained from WikiCFP

Cookies help us deliver our services. By using our services, you agree to our use of cookies.