ARES 2010 – Conference on Availability, Reliability and Security (ARES 2010)

Venue: Krakow

Location: Krakow, Poland

Event Date/Time: Feb 15, 2010 End Date/Time: Feb 18, 2010
Registration Date: Nov 14, 2009
Early Registration Date: Nov 14, 2009
Abstract Submission Date: Sep 01, 2009
Paper Submission Date: Sep 01, 2009
Report as Spam

Description

The Fifth International Conference on Availability, Reliability and Security (AReS 2010)

February, 15th – 18th 2010, Krakow, Poland

Conference

The Fifth International Conference on Availability, Reliability and Security (“ARES – The International Security and Dependability Conference”) will bring together researchers and practitioners in the area of IT-Security and Dependability. ARES will highlight the various aspects of security – with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.The proceedings of the ARES conference are published by IEEE.

Important Dates

Submission Deadline: September, 01st 2009
Author Notification: November, 01st 2009
Author Registration: November, 14th 2009
Proceedings Version: November, 14th 2009
Conference: February, 15th - 18th 2010

Workshop Proposal

In conjunction with the ARES conference, a number of workshops will be organized.
Workshop proposals should include the call for papers, the number of papers to be accepted,
the contact person, etc. They are to be sent to the Workshop Organizing Committee (ares-workshop[at]securityresearch.at).

Topics of interest include, but are not limited to:

Authorization and Authentication
Availability and Reliability
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
Dependability Aspects of Electronic Government (e-Government)
Dependability Administration
Dependability in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Failure Prevention
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Internet Dependability
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security
Privacy-Enhancing Technologies
Process based Security Models and Methods
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security Issues for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Standards, Guidelines and Certification
Survivability of Computing Systems
Temporal Aspects of Dependability
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
VOIP, Wireless Security

Venue

Types