ARES 2013

From ConfIDent
Deadlines
2013-05-15
2013-02-01
2013-03-01
1
Feb
2013
Workshop
1
Mar
2013
Submission
15
May
2013
Notification
organization
Metrics
Submitted Papers
91
Accepted Papers
22
Venue

Universität Regensburg, Regensburg, Bavaria, Germany

Loading map...

The 8th International Conference on Availability, Reliability and Security (ARES) 2013


Topics

  • Authorization and Authentication
  • Availability and Reliability
  • Business Continuity & Resilience
  • Cost/Benefit Analysis
  • Cryptography
  • Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
  • Dependability Aspects of Electronic Government (e-Government)
  • Dependability Administration
  • Dependability in Open Source Software
  • Designing Security Requirements
  • Digital Forensics
  • E-Commerce Dependability
  • Failure Prevention
  • Identity Management
  • IPR of Security Technology
  • Incident Response and Prevention
  • Information Flow Control
  • Information Hiding
  • Internet Dependability
  • Interoperability Aspects
  • Intrusion Detection and Fraud Detection
  • Legal Issues
  • Mobile Security
  • Network and Organizational Vulnerability Analysis
  • Network Security
  • Privacy-Enhancing Technologies
  • Process based Security Models and Methods
  • RFID Security and Privacy
  • Risk planning, Analysis & Awareness
  • Safety Critical Systems
  • Secure Enterprise Architectures
  • Security Issues for Ubiquitous Systems
  • Security and Privacy in E-Health
  • Security and Trust Management in P2P and Grid applications
  • Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
  • Security and Usability
  • Security as Quality of Service
  • Security in Distributed Systems / Distributed Databases
  • Security in Electronic Payments
  • Security in Electronic Voting
  • Software Engineering of Dependable Systems
  • Software Security
  • Standards, Guidelines and Certification
  • Survivability of Computing Systems
  • Temporal Aspects of Dependability
  • Threats and Attack Modelling
  • Trusted Computing
  • Tools for Dependable System Design and Evaluation
  • Trust Models and Trust Management
  • VOIP, Wireless Security


Submissions

Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.

For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:

  • full paper (10 pages)
  • short paper (6 pages)
  • workshop paper (8 pages, a maximum of 10 pages is tolerated)

For the Industrial Track submission papers are classified into 2 categorizes:

  • full paper (up to 8 pages)
  • abstracts (2 pages)

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition. Contact author must provide the following information at the ARES conference system: paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords.


Important Dates

Workshop Proposal:a lt Until February 1st, 2013
Workshop Proposal Notification: alt 2 weeks after submission of proposal
Submission Deadline: alt March 1st, 2013 extended to March 12th, 2013
Author Notification: alt May 15th, 2013
Author Registration: alt May 25th, 2013
Proceedings Version: alt June 14th, 2013
Conference: alt September 2nd - 6th, 2013

Cookies help us deliver our services. By using our services, you agree to our use of cookies.