The 9th International Conference on Availability, Reliability and Security
(ARES 2014)
University of Fribourg, Switzerland
8th – 12th September 2014
Conference
The 9th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security.
ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.
ARES will emphasize the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.
Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals.
Conference Officers
General Chair
Stephanie Teufel, Dean of the faculty of economics & social sciences, University of Fribourg, Switzerland
Program Committee Co-Chairs
Edgar Weippl, Vienna University of Technology and SBA Research, Austria
Collin Mulliner, Northeastern University, USA
Keynote Speakers
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Volkmar Lotz, SAP Research, Germany
Important Dates
Submission Deadline | |
Author Notification | May 19th, 2014 |
Author Registration | June 10th, 2014 |
Proceedings Version | June 20th, 2014 |
Conference | September 8th – 12th, 2014 |
Topics of interest include, but are not limited to:
Authorization and Authentication Availability and Reliability Business Continuity & Resilience Cost/Benefit Analysis Cryptography Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics) Dependability Aspects of Electronic Government (e-Government) Dependability Administration Dependability in Open Source Software Designing Security Requirements Digital Forensics E-Commerce Dependability Failure Prevention Identity Management IPR of Security Technology Incident Response and Prevention Information Flow Control Information Hiding Internet Dependability Interoperability Aspects Intrusion Detection and Fraud Detection Legal Issues Mobile Security Network and Organizational Vulnerability Analysis Network Security |
Privacy-Enhancing Technologies Process based Security Models and Methods RFID Security and Privacy Risk planning, Analysis & Awareness Safety Critical Systems Secure Enterprise Architectures Security Issues for Ubiquitous Systems Security and Privacy in E-Health Security and Trust Management in P2P and Grid applications Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications Security and Usability Security as Quality of Service Security in Distributed Systems / Distributed Databases Security in Electronic Payments Security in Electronic Voting Software Engineering of Dependable Systems Software Security Standards, Guidelines and Certification Survivability of Computing Systems Temporal Aspects of Dependability Threats and Attack Modelling Trusted Computing Tools for Dependable System Design and Evaluation Trust Models and Trust Management VOIP, Wireless Security |
Submission
To submit a paper please visit our >>submission<<>page.