Our Sponsors
Website http://www.ares-conference.eu/conference/ |
Edit Freely
Category ARES 2016
Deadline: March 13, 2016 | Date: August 31, 2016-September 02, 2016
Venue/Country: Salzburg, Austria
Updated: 2016-02-02 21:19:42 (GMT+9)
ARES CONFERENCEThe 11th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security.ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals. The acceptance rate of the ARES 2015 conference was 29% (full papers only). The ARES conferences have been published by Conference Publishing Services (CPS).CONFERENCE OFFICERSGeneral Chair Dominik Engel, Salzburg University of Applied Sciences, AustriaProgram Committee ChairsStephen B. Wicker, Cornell University, USADominik Engel, Salzburg University of Applied Sciences, AustriaIMPORTANT DATESSubmission Deadline: March 13, 2016Author Notification: May 30, 2016Proceedings Version: June 20, 2016Conference: August 31 - September 2, 2016SUBMISSIONThe proceedings of ARES (including workshops) have been published by Conference Publishing Services (CPS) of IEEE. Authors of selected papers that are accepted by and presented at the ARES Conference (including workshops) will be invited to submit an extended version to special issues of international journals.Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:full paper (10 pages)short paper (6 pages)workshop paper (8 pages, a maximum of 10 pages is tolerated)Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.Double blind review: ARES requires anonymized submissions ? please make sure that submitted papers contain no author names or obvious self-references.The ARES submission system (EasyChair) is available here: https://easychair.org/conferences/?conf=ares2016
PROGRAM COMMITTEEIsaac Agudo, University of Malaga, SpainEsma Aimeur, University of Montreal, CanadaPhilipp Amann, Europol, EC3, NetherlandsTodd R. Andel, University of South Alabama, USAmin Anjomshoaa, Massachusetts Institute of Technology (MIT), USFrancesco Buccafurri, University of Reggio Calabria, ItalyLuanne Burns Goldrich, The Johns Hopkins University Applied Physics Laboratory, USMario Cagalj, University of Split, CroatiaJordi Castellà-Roca,Rovira i Virgili University of Tarragona, SpainLorenzo Cavallaro, Royal Holloway, University of London, UKDavid Chadwick, University of Kent, UKSoon Ae Chun, City University of New York, USNathan Clarke, Plymouth University, UKMarijke Coetzee, University of Johannesburg, South AfricaMark Dillon, International Criminal Court, NLAdam Doupé, Arizona State University, USPavlos Efraimidis, Democritus University of Thrace, GreeceChristian Engelmann, Oak Ridge National Laboratory, USKarl M. Goeschka, Vienna University of Technology, AustriaLuis Enrique Sánchez Crespo, University of Castilla-la Mancha, SpainZekeriya Erkin, TU Delft, NetherlandsAristide Fattori, Università degli Studi di Milano, ItalyHannes Federrath, University of Hamburg, GermanyChristophe Feltus, Luxembourg Institute of Science and Technology, LuxembourgJosé Maria de Fuentes, Carlos III University of Madrid, SpainSteven Furnell, Plymouth University, UKNico Golde, Qualcomm Research Germany, GermanyBogdan Groza, Politehnica University of Timisoara, RomaniaDominik Herrmann, University Hamburg, GermanyMartin Gilje Jaatun, SINTEF, NorwayHai Jin, Huazhong University of Science and Technology, ChinaJan Jürjens, TU Dortmund and Fraunhofer ISST, GermanySokratis K. Katsikas, University of Piraeus, GreecePeter Kieseberg, SBA Research, AustriaEzzat Kirmani, St. Cloud State University, USThomas Korak, TU Graz, AustriaThorsten Kramp, IBM Research Zurich, SwitzerlandRalf Kuesters, University of Trier, GermanyCostas Lambrinoudakis, University of Piraeus, GreeceShujun Li University of Surrey, UKGiovanni Livraga, Universita‘ degli Studi di Milano, ItalyJavier Lopez, University of Malaga, SpainKonstantinos Markantonakis, Royal Holloway, University of London, UKKeith Martin, Royal Holloway, University of London, UKIoannis Mavridis, University of Macedonia, GreeceWojciech Mazurczyk, Warsaw University of Technology, PolandJeffrey McDonald, University of South Alabama, USMattia Monga, Universita` degli Studi di Milano, ItalyHaralambos Mouratidis, University of Brighton, UKThomas Moyer, MIT Lincoln Laboratory, USAlexios Mylonas, Staffordshire University, UKThomas Nowey, Krones AG, GermanyChristoforos Ntantogian, University of Piraeus, GreeceRolf Oppliger, eSECURITY Technologies, SwitzerlandJaehong Park, University of Alabama in Huntsville, USGünther Pernul, University of Regensburg, GermanyAndreas Peter, University of Twente, NetherlandsSriram Raghavan, Secure Cyber Space, AustraliaStefanie Rinderle-Ma, Vienna University, AustriaStefanie Roos, TU Dresden, GermanyDomenico Rosaci, University ?Mediterranea“ of Reggio Calabria, ItalyVolker Roth, Freie Universität Berlin, GermanyGiovanni Russello, University of Auckland, New ZealandMark Scanlon, University College Dublin, IrelandSebastian Schinzel, FH Münster, GermanyJörn-Marc Schmidt, secunet, GermanyMax Schuchard, University of Minnesota, USStefan Schulte Vienna University of Technology, AustriaDimitris Simos, SBA Research, AustriaJon A. Solworth, University of Illinois at Chicago, USMark Strembeck, WU Vienna, AustriaJakub Szefer, Yale School of Engineering & Applied Science, USOliver Theel, Carl von Ossietzky Universität Oldenburg, GermanySimon Tjoa, St. Pölten University of Applied Sciences, AustriaAndreas Unterweger, Salzburg University of Applied Sciences, AustriaUmberto Villano, Universita‘ del Sannio, ItalyArtemios Voyiatzis, SBA Research, AustriaXiao Wang, Carnegie Mellon University, USJinpeng Wei, Florida International University, USChristos Xenakis, University of Piraeus, GreeceFabian Yamaguchi, Göttingen University, GermanyAlec Yasinsac, University of South Alabama, USNicola Zannone, Eindhoven University of Technology, NetherlandsTOPCIS of interest include, but are not limited to:Authorization and AuthenticationAvailability and ReliabilityBusiness Continuity & ResilienceCost/Benefit AnalysisCryptographyDependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)Dependability Aspects of Electronic Government (e-Government)Dependability AdministrationDependability in Open Source SoftwareDesigning Security RequirementsDigital ForensicsE-Commerce DependabilityFailure PreventionIdentity ManagementIPR of Security TechnologyIncident Response and PreventionInformation Flow ControlInformation HidingInternet DependabilityInteroperability AspectsIntrusion Detection and Fraud DetectionLegal IssuesMobile SecurityNetwork and Organizational Vulnerability AnalysisNetwork Security Privacy-Enhancing TechnologiesProcess based Security Models and MethodsRFID Security and PrivacyRisk planning, Analysis & AwarenessSafety Critical SystemsSecure Enterprise ArchitecturesSecurity Issues for Ubiquitous SystemsSecurity and Privacy in E-HealthSecurity and Trust Management in P2P and Grid applicationsSecurity and Privacy for Sensor Networks, Wireless/Mobile Devices and ApplicationsSecurity and UsabilitySecurity as Quality of ServiceSecurity in Distributed Systems / Distributed DatabasesSecurity in Electronic PaymentsSecurity in Electronic VotingSoftware Engineering of Dependable SystemsSoftware SecurityStandards, Guidelines and CertificationSurvivability of Computing SystemsTemporal Aspects of DependabilityThreats and Attack ModellingTrusted ComputingTools for Dependable System Design and EvaluationTrust Models and Trust ManagementVOIP, Wireless SecurityKeywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.