Difference between revisions of "Event:ARES 2014"

From ConfIDent
m (Text replacement - "Homepage=" to "Official Website=")
Line 2: Line 2:
 
|Acronym=ARES 2014
 
|Acronym=ARES 2014
 
|Title=9th International Conference on Availability, Reliability and Security
 
|Title=9th International Conference on Availability, Reliability and Security
 +
|Ordinal=9
 +
|In Event Series=Event Series:ARES
 +
|Single Day Event=no
 +
|Start Date=2014/09/08
 +
|End Date=2014/09/12
 +
|Event Status=as scheduled
 +
|Event Mode=on site
 +
|Venue=Université de Fribourg - Sciences économiques et sociales
 +
|City=Fribourg
 +
|Region=Fribourg
 +
|Country=Country:CH
 +
|Academic Field=Security
 +
|Official Website=https://www.ares-conference.eu/ares2014/www.ares-conference.eu/conference/index.html
 
|Type=Conference
 
|Type=Conference
|Official Website=https://www.ares-conference.eu/ares2014/www.ares-conference.eu/conference/index.html
 
|City=Freiburg
 
|Country=Country:CH
 
 
|has general chair=Stephanie Teufel
 
|has general chair=Stephanie Teufel
 
|has program chair=Edgar Weippl, Collin Mulliner
 
|has program chair=Edgar Weippl, Collin Mulliner
Line 13: Line 23:
 
|pageEditor=User:Curator 75
 
|pageEditor=User:Curator 75
 
|contributionType=1
 
|contributionType=1
|In Event Series=Event Series:ARES
 
|Single Day Event=no
 
|Start Date=2014/09/08
 
|End Date=2014/09/12
 
|Event Status=as scheduled
 
|Event Mode=on site
 
 
}}
 
}}
 
{{Event Deadline
 
{{Event Deadline
 
|Notification Deadline=2014/05/19
 
|Notification Deadline=2014/05/19
 
|Submission Deadline=2014/03/07
 
|Submission Deadline=2014/03/07
 +
}}
 +
{{Organizer
 +
|Contributor Type=organization
 +
|Organization=SBA Research
 
}}
 
}}
 
{{Event Metric
 
{{Event Metric
Line 33: Line 41:
  
 
==Topics==
 
==Topics==
* Authorization and Authentication
+
*Authorization and Authentication
* Availability and Reliability
+
*Availability and Reliability
* Business Continuity & Resilience
+
*Business Continuity & Resilience
* Cost/Benefit Analysis
+
*Cost/Benefit Analysis
* Cryptography
+
*Cryptography
* Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
+
*Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
* Dependability Aspects of Electronic Government (e-Government)
+
*Dependability Aspects of Electronic Government (e-Government)
* Dependability Administration
+
*Dependability Administration
* Dependability in Open Source Software
+
*Dependability in Open Source Software
* Designing Security Requirements
+
*Designing Security Requirements
* Digital Forensics
+
*Digital Forensics
* E-Commerce Dependability
+
*E-Commerce Dependability
* Failure Prevention
+
*Failure Prevention
* Identity Management
+
*Identity Management
* IPR of Security Technology
+
*IPR of Security Technology
* Incident Response and Prevention
+
*Incident Response and Prevention
* Information Flow Control
+
*Information Flow Control
* Information Hiding
+
*Information Hiding
* Internet Dependability
+
*Internet Dependability
* Interoperability Aspects
+
*Interoperability Aspects
* Intrusion Detection and Fraud Detection
+
*Intrusion Detection and Fraud Detection
* Legal Issues
+
*Legal Issues
* Mobile Security
+
*Mobile Security
* Network and Organizational Vulnerability Analysis
+
*Network and Organizational Vulnerability Analysis
* Network Security
+
*Network Security
* Privacy-Enhancing Technologies
+
*Privacy-Enhancing Technologies
* Process based Security Models and Methods
+
*Process based Security Models and Methods
* RFID Security and Privacy
+
*RFID Security and Privacy
* Risk planning, Analysis & Awareness
+
*Risk planning, Analysis & Awareness
* Safety Critical Systems
+
*Safety Critical Systems
* Secure Enterprise Architectures
+
*Secure Enterprise Architectures
* Security Issues for Ubiquitous Systems
+
*Security Issues for Ubiquitous Systems
* Security and Privacy in E-Health
+
*Security and Privacy in E-Health
* Security and Trust Management in P2P and Grid applications
+
*Security and Trust Management in P2P and Grid applications
* Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
+
*Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
* Security and Usability
+
*Security and Usability
* Security as Quality of Service
+
*Security as Quality of Service
* Security in Distributed Systems / Distributed Databases
+
*Security in Distributed Systems / Distributed Databases
* Security in Electronic Payments
+
*Security in Electronic Payments
* Security in Electronic Voting
+
*Security in Electronic Voting
* Software Engineering of Dependable Systems
+
*Software Engineering of Dependable Systems
* Software Security
+
*Software Security
* Standards, Guidelines and Certification
+
*Standards, Guidelines and Certification
* Survivability of Computing Systems
+
*Survivability of Computing Systems
* Temporal Aspects of Dependability
+
*Temporal Aspects of Dependability
* Threats and Attack Modelling
+
*Threats and Attack Modelling
* Trusted Computing
+
*Trusted Computing
* Tools for Dependable System Design and Evaluation
+
*Tools for Dependable System Design and Evaluation
* Trust Models and Trust Management
+
*Trust Models and Trust Management
* VOIP, Wireless Security
+
*VOIP, Wireless Security
  
  

Revision as of 13:17, 24 February 2023

Deadlines
2014-05-19
2014-03-07
7
Mar
2014
Submission
19
May
2014
Notification
organization
Metrics
Submitted Papers
81
Accepted Papers
13
Venue

Université de Fribourg - Sciences économiques et sociales, Fribourg, Switzerland

Loading map...

The 9th International Conference on Availability, Reliability and Security (ARES) 2014


Topics

  • Authorization and Authentication
  • Availability and Reliability
  • Business Continuity & Resilience
  • Cost/Benefit Analysis
  • Cryptography
  • Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
  • Dependability Aspects of Electronic Government (e-Government)
  • Dependability Administration
  • Dependability in Open Source Software
  • Designing Security Requirements
  • Digital Forensics
  • E-Commerce Dependability
  • Failure Prevention
  • Identity Management
  • IPR of Security Technology
  • Incident Response and Prevention
  • Information Flow Control
  • Information Hiding
  • Internet Dependability
  • Interoperability Aspects
  • Intrusion Detection and Fraud Detection
  • Legal Issues
  • Mobile Security
  • Network and Organizational Vulnerability Analysis
  • Network Security
  • Privacy-Enhancing Technologies
  • Process based Security Models and Methods
  • RFID Security and Privacy
  • Risk planning, Analysis & Awareness
  • Safety Critical Systems
  • Secure Enterprise Architectures
  • Security Issues for Ubiquitous Systems
  • Security and Privacy in E-Health
  • Security and Trust Management in P2P and Grid applications
  • Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
  • Security and Usability
  • Security as Quality of Service
  • Security in Distributed Systems / Distributed Databases
  • Security in Electronic Payments
  • Security in Electronic Voting
  • Software Engineering of Dependable Systems
  • Software Security
  • Standards, Guidelines and Certification
  • Survivability of Computing Systems
  • Temporal Aspects of Dependability
  • Threats and Attack Modelling
  • Trusted Computing
  • Tools for Dependable System Design and Evaluation
  • Trust Models and Trust Management
  • VOIP, Wireless Security


Submissions

Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.

For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:

  • full paper (10 pages)
  • short paper (6 pages)
  • workshop paper (8 pages, a maximum of 10 pages is tolerated)
  • extended abstracts (2 pages, only possible in the ARES Industrial track)

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.

Contact author must provide the following information at the ARES conference system: paper title, authors’ names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.

Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.


Important Dates

Workshop Proposal: Until February 1st, 2014
Workshop Proposal Notification: 2 weeks after submission of proposal
Submission Deadline: March 7th, 2014 extended to March 19th, 2014
Author Notification: May 19th, 2014
Author Registration: June 10th, 2014
Proceedings Version: June 20th, 2014
Conference: September 8th – 12th, 2014

Cookies help us deliver our services. By using our services, you agree to our use of cookies.