Difference between revisions of "Event:ARES 2018"

From ConfIDent
m (Text replacement - "Homepage=" to "Official Website=")
Line 2: Line 2:
 
|Acronym=ARES 2018
 
|Acronym=ARES 2018
 
|Title=13th International Conference on Availability, Reliability and Security
 
|Title=13th International Conference on Availability, Reliability and Security
|Type=Conference
+
|Ordinal=13
|Official Website=https://2018.ares-conference.eu/
+
|In Event Series=Event Series:ARES
 +
|Single Day Event=no
 +
|Start Date=2018/08/27
 +
|End Date=2018/08/30
 +
|Event Status=as scheduled
 +
|Event Mode=on site
 +
|Venue=Universität Hamburg
 
|City=Hamburg
 
|City=Hamburg
 +
|Region=Hamburg
 
|Country=Country:DE
 
|Country=Country:DE
 +
|Academic Field=Security
 +
|Official Website=https://2018.ares-conference.eu/
 +
|Type=Conference
 
|has general chair=Mathias Fischer, Dominik Herrmann
 
|has general chair=Mathias Fischer, Dominik Herrmann
 
|has program chair=Christian Doerr, Sebastian Schrittwieser
 
|has program chair=Christian Doerr, Sebastian Schrittwieser
Line 15: Line 25:
 
|pageEditor=User:Curator 75
 
|pageEditor=User:Curator 75
 
|contributionType=1
 
|contributionType=1
|In Event Series=Event Series:ARES
 
|Single Day Event=no
 
|Start Date=2018/08/27
 
|End Date=2018/08/30
 
|Event Status=as scheduled
 
|Event Mode=on site
 
 
}}
 
}}
 
{{Event Deadline
 
{{Event Deadline
Line 26: Line 30:
 
|Camera-Ready Deadline=2018/06/29
 
|Camera-Ready Deadline=2018/06/29
 
|Submission Deadline=2018/03/16
 
|Submission Deadline=2018/03/16
 +
}}
 +
{{Organizer
 +
|Contributor Type=organization
 +
|Organization=SBA Research
 
}}
 
}}
 
{{Event Metric
 
{{Event Metric
Line 37: Line 45:
  
 
==Topics==
 
==Topics==
* Authorization, Authentication, and Access Control  
+
*Authorization, Authentication, and Access Control
* Availability, Dependability, and Resilience  
+
*Availability, Dependability, and Resilience
* Botnets and Botnet Monitoring  
+
*Botnets and Botnet Monitoring
* Business Continuity & Resilience  
+
*Business Continuity & Resilience
* Cost/Benefit Analysis  
+
*Cost/Benefit Analysis
* Cryptography  
+
*Cryptography
* Dependability Aspects for Special Applications  
+
*Dependability Aspects for Special Applications
* Dependability Aspects of e-Government  
+
*Dependability Aspects of e-Government
* Dependability and Resilience in Open Source Software  
+
*Dependability and Resilience in Open Source Software
* Designing Security Requirements  
+
*Designing Security Requirements
* Digital Forensics  
+
*Digital Forensics
* E-Commerce Dependability  
+
*E-Commerce Dependability
* Identity Management  
+
*Identity Management
* IPR of Security Technology  
+
*IPR of Security Technology
* Incident Response and Prevention  
+
*Incident Response and Prevention
* Information Flow Control  
+
*Information Flow Control
* Information Hiding and Steganography  
+
*Information Hiding and Steganography
* Interoperability Aspects  
+
*Interoperability Aspects
* Intrusion Detection and Fraud Detection  
+
*Intrusion Detection and Fraud Detection
* Legal Issues related to Security and Privacy  
+
*Legal Issues related to Security and Privacy
* Mobile Security  
+
*Mobile Security
* Network and Organizational Vulnerability Analysis  
+
*Network and Organizational Vulnerability Analysis
* Network Security  
+
*Network Security
* Privacy-Enhancing Technologies  
+
*Privacy-Enhancing Technologies
* Process based Security Models and Methods  
+
*Process based Security Models and Methods
* Resilience and Security for Critical Infrastructures
+
*Resilience and Security for Critical Infrastructures
* Resilience of Computing Systems  
+
*Resilience of Computing Systems
* Resilience, Security, and Privacy for Smart Grids  
+
*Resilience, Security, and Privacy for Smart Grids
* Resilience, Security, and Privacy for the Internet of Things  
+
*Resilience, Security, and Privacy for the Internet of Things
* RFID Security and Privacy  
+
*RFID Security and Privacy
* Risk planning, Analysis & Awareness  
+
*Risk planning, Analysis & Awareness
* Safety Critical Systems  
+
*Safety Critical Systems
* Secure Enterprise Architectures  
+
*Secure Enterprise Architectures
* Security and Privacy for Ubiquitous Systems  
+
*Security and Privacy for Ubiquitous Systems
* Security and Privacy in E-Health  
+
*Security and Privacy in E-Health
* Security and Trust Management in P2P and Grid applications  
+
*Security and Trust Management in P2P and Grid applications
* Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications  
+
*Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
* Security and Usability  
+
*Security and Usability
* Security as Quality of Service  
+
*Security as Quality of Service
* Security in Distributed Systems / Distributed Databases  
+
*Security in Distributed Systems / Distributed Databases
* Security in Electronic Payments  
+
*Security in Electronic Payments
* Security in Electronic Voting  
+
*Security in Electronic Voting
* Software Engineering of Dependable Systems  
+
*Software Engineering of Dependable Systems
* Software Security  
+
*Software Security
* Threats and Attack Modelling  
+
*Threats and Attack Modelling
* Trusted Computing  
+
*Trusted Computing
* Tools for Dependable System Design and Evaluation  
+
*Tools for Dependable System Design and Evaluation
* Trust Models and Trust Management  
+
*Trust Models and Trust Management
* Wireless Security  
+
*Wireless Security
  
  

Revision as of 12:47, 24 February 2023

Deadlines
2018-05-30
2018-06-29
2018-03-16
16
Mar
2018
Submission
30
May
2018
Notification
29
Jun
2018
Camera-Ready
organization
Metrics
Submitted Papers
112
Accepted Papers
25
Accepted Short Papers
12
Venue

Universität Hamburg, Hamburg, Germany

Loading map...

The 13th International Conference on Availability, Reliability and Security (ARES) 2018


Topics

  • Authorization, Authentication, and Access Control
  • Availability, Dependability, and Resilience
  • Botnets and Botnet Monitoring
  • Business Continuity & Resilience
  • Cost/Benefit Analysis
  • Cryptography
  • Dependability Aspects for Special Applications
  • Dependability Aspects of e-Government
  • Dependability and Resilience in Open Source Software
  • Designing Security Requirements
  • Digital Forensics
  • E-Commerce Dependability
  • Identity Management
  • IPR of Security Technology
  • Incident Response and Prevention
  • Information Flow Control
  • Information Hiding and Steganography
  • Interoperability Aspects
  • Intrusion Detection and Fraud Detection
  • Legal Issues related to Security and Privacy
  • Mobile Security
  • Network and Organizational Vulnerability Analysis
  • Network Security
  • Privacy-Enhancing Technologies
  • Process based Security Models and Methods
  • Resilience and Security for Critical Infrastructures
  • Resilience of Computing Systems
  • Resilience, Security, and Privacy for Smart Grids
  • Resilience, Security, and Privacy for the Internet of Things
  • RFID Security and Privacy
  • Risk planning, Analysis & Awareness
  • Safety Critical Systems
  • Secure Enterprise Architectures
  • Security and Privacy for Ubiquitous Systems
  • Security and Privacy in E-Health
  • Security and Trust Management in P2P and Grid applications
  • Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
  • Security and Usability
  • Security as Quality of Service
  • Security in Distributed Systems / Distributed Databases
  • Security in Electronic Payments
  • Security in Electronic Voting
  • Software Engineering of Dependable Systems
  • Software Security
  • Threats and Attack Modelling
  • Trusted Computing
  • Tools for Dependable System Design and Evaluation
  • Trust Models and Trust Management
  • Wireless Security


Important Dates

Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)
Author Notification: May 30, 2018
Camera-ready: June 29, 2018
Conference: August 27 – August 30, 2018

Cookies help us deliver our services. By using our services, you agree to our use of cookies.