(mobo import Concept___Events_With_Metrics-migrated) |
Curator 91 (talk | contribs) |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
|Acronym=ARES 2018 | |Acronym=ARES 2018 | ||
|Title=13th International Conference on Availability, Reliability and Security | |Title=13th International Conference on Availability, Reliability and Security | ||
− | | | + | |Ordinal=13 |
− | | | + | |In Event Series=Event Series:ARES |
+ | |Single Day Event=no | ||
+ | |Start Date=2018/08/27 | ||
+ | |End Date=2018/08/30 | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=on site | ||
+ | |Venue=Universität Hamburg | ||
|City=Hamburg | |City=Hamburg | ||
+ | |Region=Hamburg | ||
|Country=Country:DE | |Country=Country:DE | ||
+ | |Academic Field=Security | ||
+ | |Official Website=https://2018.ares-conference.eu/ | ||
+ | |DOI=10.25798/nx0d-v048 | ||
+ | |Type=Conference | ||
|has general chair=Mathias Fischer, Dominik Herrmann | |has general chair=Mathias Fischer, Dominik Herrmann | ||
|has program chair=Christian Doerr, Sebastian Schrittwieser | |has program chair=Christian Doerr, Sebastian Schrittwieser | ||
Line 15: | Line 26: | ||
|pageEditor=User:Curator 75 | |pageEditor=User:Curator 75 | ||
|contributionType=1 | |contributionType=1 | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
{{Event Deadline | {{Event Deadline | ||
Line 26: | Line 31: | ||
|Camera-Ready Deadline=2018/06/29 | |Camera-Ready Deadline=2018/06/29 | ||
|Submission Deadline=2018/03/16 | |Submission Deadline=2018/03/16 | ||
+ | }} | ||
+ | {{Organizer | ||
+ | |Contributor Type=organization | ||
+ | |Organization=SBA Research | ||
}} | }} | ||
{{Event Metric | {{Event Metric | ||
Line 37: | Line 46: | ||
==Topics== | ==Topics== | ||
− | * Authorization, Authentication, and Access Control | + | *Authorization, Authentication, and Access Control |
− | * Availability, Dependability, and Resilience | + | *Availability, Dependability, and Resilience |
− | * Botnets and Botnet Monitoring | + | *Botnets and Botnet Monitoring |
− | * Business Continuity & Resilience | + | *Business Continuity & Resilience |
− | * Cost/Benefit Analysis | + | *Cost/Benefit Analysis |
− | * Cryptography | + | *Cryptography |
− | * Dependability Aspects for Special Applications | + | *Dependability Aspects for Special Applications |
− | * Dependability Aspects of e-Government | + | *Dependability Aspects of e-Government |
− | * Dependability and Resilience in Open Source Software | + | *Dependability and Resilience in Open Source Software |
− | * Designing Security Requirements | + | *Designing Security Requirements |
− | * Digital Forensics | + | *Digital Forensics |
− | * E-Commerce Dependability | + | *E-Commerce Dependability |
− | * Identity Management | + | *Identity Management |
− | * IPR of Security Technology | + | *IPR of Security Technology |
− | * Incident Response and Prevention | + | *Incident Response and Prevention |
− | * Information Flow Control | + | *Information Flow Control |
− | * Information Hiding and Steganography | + | *Information Hiding and Steganography |
− | * Interoperability Aspects | + | *Interoperability Aspects |
− | * Intrusion Detection and Fraud Detection | + | *Intrusion Detection and Fraud Detection |
− | * Legal Issues related to Security and Privacy | + | *Legal Issues related to Security and Privacy |
− | * Mobile Security | + | *Mobile Security |
− | * Network and Organizational Vulnerability Analysis | + | *Network and Organizational Vulnerability Analysis |
− | * Network Security | + | *Network Security |
− | * Privacy-Enhancing Technologies | + | *Privacy-Enhancing Technologies |
− | * Process based Security Models and Methods | + | *Process based Security Models and Methods |
− | * Resilience and Security for Critical Infrastructures | + | *Resilience and Security for Critical Infrastructures |
− | * Resilience of Computing Systems | + | *Resilience of Computing Systems |
− | * Resilience, Security, and Privacy for Smart Grids | + | *Resilience, Security, and Privacy for Smart Grids |
− | * Resilience, Security, and Privacy for the Internet of Things | + | *Resilience, Security, and Privacy for the Internet of Things |
− | * RFID Security and Privacy | + | *RFID Security and Privacy |
− | * Risk planning, Analysis & Awareness | + | *Risk planning, Analysis & Awareness |
− | * Safety Critical Systems | + | *Safety Critical Systems |
− | * Secure Enterprise Architectures | + | *Secure Enterprise Architectures |
− | * Security and Privacy for Ubiquitous Systems | + | *Security and Privacy for Ubiquitous Systems |
− | * Security and Privacy in E-Health | + | *Security and Privacy in E-Health |
− | * Security and Trust Management in P2P and Grid applications | + | *Security and Trust Management in P2P and Grid applications |
− | * Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications | + | *Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications |
− | * Security and Usability | + | *Security and Usability |
− | * Security as Quality of Service | + | *Security as Quality of Service |
− | * Security in Distributed Systems / Distributed Databases | + | *Security in Distributed Systems / Distributed Databases |
− | * Security in Electronic Payments | + | *Security in Electronic Payments |
− | * Security in Electronic Voting | + | *Security in Electronic Voting |
− | * Software Engineering of Dependable Systems | + | *Software Engineering of Dependable Systems |
− | * Software Security | + | *Software Security |
− | * Threats and Attack Modelling | + | *Threats and Attack Modelling |
− | * Trusted Computing | + | *Trusted Computing |
− | * Tools for Dependable System Design and Evaluation | + | *Tools for Dependable System Design and Evaluation |
− | * Trust Models and Trust Management | + | *Trust Models and Trust Management |
− | * Wireless Security | + | *Wireless Security |
Latest revision as of 12:01, 4 August 2023
Deadlines
|
||
Submission |
|
||
Notification |
|
||
Camera-Ready |
Metrics
Submitted Papers
112
Accepted Papers
25
Accepted Short Papers
12
Venue
Universität Hamburg, Hamburg, Germany
The 13th International Conference on Availability, Reliability and Security (ARES) 2018
Topics
- Authorization, Authentication, and Access Control
- Availability, Dependability, and Resilience
- Botnets and Botnet Monitoring
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications
- Dependability Aspects of e-Government
- Dependability and Resilience in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding and Steganography
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues related to Security and Privacy
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security
- Privacy-Enhancing Technologies
- Process based Security Models and Methods
- Resilience and Security for Critical Infrastructures
- Resilience of Computing Systems
- Resilience, Security, and Privacy for Smart Grids
- Resilience, Security, and Privacy for the Internet of Things
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security and Privacy for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- Wireless Security
Important Dates
Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)
Author Notification: May 30, 2018
Camera-ready: June 29, 2018
Conference: August 27 – August 30, 2018