ARES 2018 - International Conference on Availability, Reliability and Security
View: 660
Website https://www.ares-conference.eu/ |
Edit Freely
Category ARES 2018
Deadline: March 16, 2018 | Date: August 27, 2018-August 30, 2018
Venue/Country: Hamburg, Germany
Updated: 2018-01-16 19:33:11 (GMT+9)
Call For Papers - CFP
ARES 2018 - CALL FOR PAPERSThe 13th International Conference on Availability, Reliability and Security (ARES 2018)August 27 - August 30, 2018, Hamburg, Germanyhttp://www.ares-conference.euARES CONFERENCEThe 13th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security.ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.ARES will emphasize the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals (e.g. Springer EURASIP Journal on Information Security). The acceptance rate of the ARES 2017 conference was 24% (full papers only). ARES 2017 was published by the International Conference Proceedings Series published by ACM (ACM ICPS).ARES is ranked as B-conference in CORE. Qualis (backed by Brazilian Ministry) ranked ARES and Esorics as leading security conference in Europe (A2)l papers only).CONFERENCE OFFICERSGeneral Chairs 2018Mathias Fischer, Universität Hamburg, GermanyDominik Herrmann, Universität Hamburg, GermanyProgram Committee Chairs 2018Christian Doerr, TU Delft, NetherlandsSebastian Schrittwieser, FH St. Pölten, AustriaIMPORTANT DATESSubmission Deadline: March 16, 2018 23:59 UTC-11Author Notification: May 30, 2018Proceedings Version: June 29, 2018Conference: August 27 - August 30, 2018SUBMISSIONARES 2017 was published by the International Conference Proceedings Series published by ACM (ACM ICPS).Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:-full paper (10 pages)-short paper (6 pages)-workshop paper (8 pages, a maximum of 10 pages is tolerated)Formating Instructions / template:Please read the template instructions carefully before submitting a paper, they can be found here (http://www.acm.org/publications/article-templates/proceedings-template.html/).Papers submitted to ARES 2018 have to use the SigConf template!Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.Contact author must provide the following information at the ARES conference system: paper title, authors’ names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference. The ARES submission system (EasyChair) is available here: https://easychair.org/conferences/?conf=ares2018Publishing preprints to Arxiv or other, open repositories is allowed prior to the notification of ARES and does not violate the requirement for novelty. Reviewers will be asked to not search for and ignore preprints that can deanonymize blinded submission.Important Note:To avoid accepting papers for ARES 2018 which are not presenting original work your paper will be plagiarism checked by PlagScan Plagarism Check. If you don’t want your paper to be checked automatically please contact us.PROGRAM COMMITTEEIsaac Agudo Ruiz, University of Malaga, SpainTodd R. Andel, University of South Alabama, United StatesAbdelmalek Benzekri, University of Toulouse, FranceFrancesco Buccafurri, University of Reggio Calabria, ItalyLasaro Camargos, Federal University of Uberlândia, BrazilDavid Chadwick, University of Kent, United KingdomNathan Clarke, Plymouth University, United KingdomJörg Daubert, TU Darmstadt, GermanyLuca De Cicco, Politecnico di Bari, ItalyJosé Maria de Fuentes, Carlos III University of Madrid, SpainPavlos Efraimidis Democritus, University of Thrace, GreeceDominik Engel, Salzburg University of Applied Sciences, AustriaChristian Engelmann, Oak Ridge National Laboratory, United StatesHannes Federrath, University of Hamburg, GermanyChristophe Feltus, Luxembourg Institute of Science and Technology, LuxembourgUmberto Ferraro Petrillo, Universitá degli studi di Roma – La Sapienza, ItalySteven Furnell, Plymouth University, United KingdomJoaquin Garcia-Alfaro, Télécom SudParis, FranceKarl Goeschka, Vienna University of Technology, AustriaLorena Gonzalez-Manzano, Carlos III University of Madrid, SpainBogdan Groza, Politehnica University of Timisoara, RomaniaSheikh Mahbub Habib, TU Darmstadt, GermanyDominik Herrmann, University Hamburg, GermanyMartin Gilje Jaatun, SINTEF, NorwayJan Jürjens, TU Dortmund and Fraunhofer ISST, GermanyAnatoli Kalysch, Friedrich-Alexander University Erlangen-Nuremberg, GermanySokratis K. Katsikas, NTNU: Norwegian University of Science and Technology, NorwayPeter Kieseberg, SBA Research, AustriaRalf Kuesters, University of Stuttgart, GermanyOksana Kulyk, TU Darmstadt, GermanyRomain Laborde, University of Toulouse, FranceCostas Lambrinoudakis, University of Piraeus, GreeceShujun Li, University of Surrey, United KingdomGiovanni Livraga, Universita’ degli Studi di Milano, ItalyRobert Luh, Institute of IT Security Research, AustriaKeith Martin, Royal Holloway, University of London, United KingdomBarbara Masucci, University of Salerno, ItalyIoannis Mavridis, University of Macedonia, GreeceWojciech Mazurczyk, Warsaw University of Technology, PolandMattia Monga, Universita` degli Studi di Milano, ItalyHaralambos Mouratidis, University of Brighton, United KingdomThomas Nowey, Krones AG, GermanyJaehong Park, University of Alabama in Huntsville, United StatesGünther Pernul, University of Regensburg, GermanyStefanie Rinderle-Ma, Vienna University, AustriaMichael Roßberg, TU Ilmenau, GermanyVolker Roth, Freie Universität Berlin, GermanyGiovanni Russello, University of Auckland, New ZealandMark Scanlon, University College Dublin, IrelandSebastian Schinzel, FH Münster, GermanyJörn-Marc Schmidt, Secunet, GermanyMax Schuchard, University of Minnesota, United StatesStefan Schulte, Vienna University of Technology, AustriaDaniele Sgandurra, Royal Holloway, University of London, United KingdomJon A. Solworth, University of Illinois at Chicago, United StatesJordi Soria-Comas, Universitat Rovira i Virgili, SpainMark Strembeck, WU Vienna, AustriaJakub Szefer, Yale University, United StatesOliver Theel, Carl von Ossietzky Universität Oldenburg, GermanySimon Tjoa, St. Pölten University of Applied Sciences, AustriaEmmanouil Vasilomanolakis, TU Darmstadt GermanyUmberto Villano, Universita’ del Sannio, ItalyCorrado Aaron, Visaggio Univeristà del Sannio, ItalyXiao Wang, Carnegie Mellon University, United StatesChristos Xenakis, University of Piraeus, GreeceNicola Zannone, Eindhoven University of Technology, NetherlandsTOPCIS of interest include, but are not limited to:Authorization, Authentication, and Access ControlAvailability, Dependability, and ResilienceBotnets and Botnet MonitoringBusiness Continuity & ResilienceCost/Benefit AnalysisCryptographyDependability Aspects for Special ApplicationsDependability Aspects of e-GovernmentDependability and Resilience in Open Source SoftwareDesigning Security RequirementsDigital ForensicsE-Commerce DependabilityIdentity ManagementIPR of Security TechnologyIncident Response and PreventionInformation Flow ControlInformation Hiding and SteganograhpyInteroperability AspectsIntrusion Detection and Fraud DetectionLegal Issues related to Security and PrivacyMobile SecurityNetwork and Organizational Vulnerability AnalysisNetwork SecurityPrivacy-Enhancing TechnologiesProcess based Security Models and MethodsResilience and Security for Critical InfrastructuresResilience of Computing SystemsResilience, Security, and Privacy for Smart GridsResilience, Security, and Privacy for the Internet of ThingsRFID Security and PrivacyRisk planning, Analysis & AwarenessSafety Critical SystemsSecure Enterprise ArchitecturesSecurity and Privacy for Ubiquitous SystemsSecurity and Privacy in E-HealthSecurity and Trust Management in P2P and Grid applicationsSecurity and Privacy for Sensor Networks, Wireless/Mobile Devices and ApplicationsSecurity and UsabilitySecurity as Quality of ServiceSecurity in Distributed Systems / Distributed DatabasesSecurity in Electronic PaymentsSecurity in Electronic VotingSoftware Engineering of Dependable SystemsSoftware SecurityThreats and Attack ModellingTrusted ComputingTools for Dependable System Design and EvaluationTrust Models and Trust ManagementWireless Security
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.