ARES 2018 - 13th International Conference on Availability, Reliability and Security (ARES 2018)
Topics/Call fo Papers
The 13th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security.
ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.
ARES will emphasize the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.
Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals (e.g. Springer EURASIP Journal on Information Security). The acceptance rate of the ARES 2017 conference was 24% (full papers only). ARES 2017 was published by the International Conference Proceedings Series published by ACM (ACM ICPS).
ARES is ranked as B-conference in CORE. Qualis (backed by Brazilian Ministry) ranked ARES and Esorics as leading security conference in Europe (A2)
l papers only).
***
CONFERENCE OFFICERS
***
General Chairs 2018
Mathias Fischer, Universität Hamburg, Germany
Dominik Herrmann, Universität Hamburg, Germany
Program Committee Chairs 2018
Christian Doerr, TU Delft, Netherlands
Sebastian Schrittwieser, FH St. Pölten, Austria
***
IMPORTANT DATES
***
Submission Deadline: March 16, 2018 23:59 UTC-11
Author Notification: May 30, 2018
Proceedings Version: June 29, 2018
Conference: August 27 - August 30, 2018
***
SUBMISSION
***
ARES 2017 was published by the International Conference Proceedings Series published by ACM (ACM ICPS).
Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.
For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:
-full paper (10 pages)
-short paper (6 pages)
-workshop paper (8 pages, a maximum of 10 pages is tolerated)
Formating Instructions / template:
Please read the template instructions carefully before submitting a paper, they can be found here (http://www.acm.org/publications/article-templates/...).
Papers submitted to ARES 2018 have to use the SigConf template!
Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.
Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.
Contact author must provide the following information at the ARES conference system: paper title, authors’ names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.
Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.
The ARES submission system (EasyChair) is available here: https://easychair.org/conferences/?conf=ares2018
Publishing preprints to Arxiv or other, open repositories is allowed prior to the notification of ARES and does not violate the requirement for novelty. Reviewers will be asked to not search for and ignore preprints that can deanonymize blinded submission.
Important Note:
To avoid accepting papers for ARES 2018 which are not presenting original work your paper will be plagiarism checked by PlagScan Plagarism Check. If you don’t want your paper to be checked automatically please contact us.
***
PROGRAM COMMITTEE
***
Isaac Agudo Ruiz, University of Malaga, Spain
Todd R. Andel, University of South Alabama, United States
Abdelmalek Benzekri, University of Toulouse, France
Francesco Buccafurri, University of Reggio Calabria, Italy
Lasaro Camargos, Federal University of Uberlândia, Brazil
David Chadwick, University of Kent, United Kingdom
Nathan Clarke, Plymouth University, United Kingdom
Jörg Daubert, TU Darmstadt, Germany
Luca De Cicco, Politecnico di Bari, Italy
José Maria de Fuentes, Carlos III University of Madrid, Spain
Pavlos Efraimidis Democritus, University of Thrace, Greece
Dominik Engel, Salzburg University of Applied Sciences, Austria
Christian Engelmann, Oak Ridge National Laboratory, United States
Hannes Federrath, University of Hamburg, Germany
Christophe Feltus, Luxembourg Institute of Science and Technology, Luxembourg
Umberto Ferraro Petrillo, Universitá degli studi di Roma – La Sapienza, Italy
Steven Furnell, Plymouth University, United Kingdom
Joaquin Garcia-Alfaro, Télécom SudParis, France
Karl Goeschka, Vienna University of Technology, Austria
Lorena Gonzalez-Manzano, Carlos III University of Madrid, Spain
Bogdan Groza, Politehnica University of Timisoara, Romania
Sheikh Mahbub Habib, TU Darmstadt, Germany
Dominik Herrmann, University Hamburg, Germany
Martin Gilje Jaatun, SINTEF, Norway
Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany
Anatoli Kalysch, Friedrich-Alexander University Erlangen-Nuremberg, Germany
Sokratis K. Katsikas, NTNU: Norwegian University of Science and Technology, Norway
Peter Kieseberg, SBA Research, Austria
Ralf Kuesters, University of Stuttgart, Germany
Oksana Kulyk, TU Darmstadt, Germany
Romain Laborde, University of Toulouse, France
Costas Lambrinoudakis, University of Piraeus, Greece
Shujun Li, University of Surrey, United Kingdom
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Robert Luh, Institute of IT Security Research, Austria
Keith Martin, Royal Holloway, University of London, United Kingdom
Barbara Masucci, University of Salerno, Italy
Ioannis Mavridis, University of Macedonia, Greece
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Mattia Monga, Universita` degli Studi di Milano, Italy
Haralambos Mouratidis, University of Brighton, United Kingdom
Thomas Nowey, Krones AG, Germany
Jaehong Park, University of Alabama in Huntsville, United States
Günther Pernul, University of Regensburg, Germany
Stefanie Rinderle-Ma, Vienna University, Austria
Michael Roßberg, TU Ilmenau, Germany
Volker Roth, Freie Universität Berlin, Germany
Giovanni Russello, University of Auckland, New Zealand
Mark Scanlon, University College Dublin, Ireland
Sebastian Schinzel, FH Münster, Germany
Jörn-Marc Schmidt, Secunet, Germany
Max Schuchard, University of Minnesota, United States
Stefan Schulte, Vienna University of Technology, Austria
Daniele Sgandurra, Royal Holloway, University of London, United Kingdom
Jon A. Solworth, University of Illinois at Chicago, United States
Jordi Soria-Comas, Universitat Rovira i Virgili, Spain
Mark Strembeck, WU Vienna, Austria
Jakub Szefer, Yale University, United States
Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany
Simon Tjoa, St. Pölten University of Applied Sciences, Austria
Emmanouil Vasilomanolakis, TU Darmstadt Germany
Umberto Villano, Universita’ del Sannio, Italy
Corrado Aaron, Visaggio Univeristà del Sannio, Italy
Xiao Wang, Carnegie Mellon University, United States
Christos Xenakis, University of Piraeus, Greece
Nicola Zannone, Eindhoven University of Technology, Netherlands
***
TOPCIS of interest include, but are not limited to:
***
Authorization, Authentication, and Access Control
Availability, Dependability, and Resilience
Botnets and Botnet Monitoring
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications
Dependability Aspects of e-Government
Dependability and Resilience in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding and Steganograhpy
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues related to Security and Privacy
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security
Privacy-Enhancing Technologies
Process based Security Models and Methods
Resilience and Security for Critical Infrastructures
Resilience of Computing Systems
Resilience, Security, and Privacy for Smart Grids
Resilience, Security, and Privacy for the Internet of Things
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security and Privacy for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
Wireless Security
ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.
ARES will emphasize the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.
Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals (e.g. Springer EURASIP Journal on Information Security). The acceptance rate of the ARES 2017 conference was 24% (full papers only). ARES 2017 was published by the International Conference Proceedings Series published by ACM (ACM ICPS).
ARES is ranked as B-conference in CORE. Qualis (backed by Brazilian Ministry) ranked ARES and Esorics as leading security conference in Europe (A2)
l papers only).
***
CONFERENCE OFFICERS
***
General Chairs 2018
Mathias Fischer, Universität Hamburg, Germany
Dominik Herrmann, Universität Hamburg, Germany
Program Committee Chairs 2018
Christian Doerr, TU Delft, Netherlands
Sebastian Schrittwieser, FH St. Pölten, Austria
***
IMPORTANT DATES
***
Submission Deadline: March 16, 2018 23:59 UTC-11
Author Notification: May 30, 2018
Proceedings Version: June 29, 2018
Conference: August 27 - August 30, 2018
***
SUBMISSION
***
ARES 2017 was published by the International Conference Proceedings Series published by ACM (ACM ICPS).
Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.
For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:
-full paper (10 pages)
-short paper (6 pages)
-workshop paper (8 pages, a maximum of 10 pages is tolerated)
Formating Instructions / template:
Please read the template instructions carefully before submitting a paper, they can be found here (http://www.acm.org/publications/article-templates/...).
Papers submitted to ARES 2018 have to use the SigConf template!
Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.
Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.
Contact author must provide the following information at the ARES conference system: paper title, authors’ names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.
Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.
The ARES submission system (EasyChair) is available here: https://easychair.org/conferences/?conf=ares2018
Publishing preprints to Arxiv or other, open repositories is allowed prior to the notification of ARES and does not violate the requirement for novelty. Reviewers will be asked to not search for and ignore preprints that can deanonymize blinded submission.
Important Note:
To avoid accepting papers for ARES 2018 which are not presenting original work your paper will be plagiarism checked by PlagScan Plagarism Check. If you don’t want your paper to be checked automatically please contact us.
***
PROGRAM COMMITTEE
***
Isaac Agudo Ruiz, University of Malaga, Spain
Todd R. Andel, University of South Alabama, United States
Abdelmalek Benzekri, University of Toulouse, France
Francesco Buccafurri, University of Reggio Calabria, Italy
Lasaro Camargos, Federal University of Uberlândia, Brazil
David Chadwick, University of Kent, United Kingdom
Nathan Clarke, Plymouth University, United Kingdom
Jörg Daubert, TU Darmstadt, Germany
Luca De Cicco, Politecnico di Bari, Italy
José Maria de Fuentes, Carlos III University of Madrid, Spain
Pavlos Efraimidis Democritus, University of Thrace, Greece
Dominik Engel, Salzburg University of Applied Sciences, Austria
Christian Engelmann, Oak Ridge National Laboratory, United States
Hannes Federrath, University of Hamburg, Germany
Christophe Feltus, Luxembourg Institute of Science and Technology, Luxembourg
Umberto Ferraro Petrillo, Universitá degli studi di Roma – La Sapienza, Italy
Steven Furnell, Plymouth University, United Kingdom
Joaquin Garcia-Alfaro, Télécom SudParis, France
Karl Goeschka, Vienna University of Technology, Austria
Lorena Gonzalez-Manzano, Carlos III University of Madrid, Spain
Bogdan Groza, Politehnica University of Timisoara, Romania
Sheikh Mahbub Habib, TU Darmstadt, Germany
Dominik Herrmann, University Hamburg, Germany
Martin Gilje Jaatun, SINTEF, Norway
Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany
Anatoli Kalysch, Friedrich-Alexander University Erlangen-Nuremberg, Germany
Sokratis K. Katsikas, NTNU: Norwegian University of Science and Technology, Norway
Peter Kieseberg, SBA Research, Austria
Ralf Kuesters, University of Stuttgart, Germany
Oksana Kulyk, TU Darmstadt, Germany
Romain Laborde, University of Toulouse, France
Costas Lambrinoudakis, University of Piraeus, Greece
Shujun Li, University of Surrey, United Kingdom
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Robert Luh, Institute of IT Security Research, Austria
Keith Martin, Royal Holloway, University of London, United Kingdom
Barbara Masucci, University of Salerno, Italy
Ioannis Mavridis, University of Macedonia, Greece
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Mattia Monga, Universita` degli Studi di Milano, Italy
Haralambos Mouratidis, University of Brighton, United Kingdom
Thomas Nowey, Krones AG, Germany
Jaehong Park, University of Alabama in Huntsville, United States
Günther Pernul, University of Regensburg, Germany
Stefanie Rinderle-Ma, Vienna University, Austria
Michael Roßberg, TU Ilmenau, Germany
Volker Roth, Freie Universität Berlin, Germany
Giovanni Russello, University of Auckland, New Zealand
Mark Scanlon, University College Dublin, Ireland
Sebastian Schinzel, FH Münster, Germany
Jörn-Marc Schmidt, Secunet, Germany
Max Schuchard, University of Minnesota, United States
Stefan Schulte, Vienna University of Technology, Austria
Daniele Sgandurra, Royal Holloway, University of London, United Kingdom
Jon A. Solworth, University of Illinois at Chicago, United States
Jordi Soria-Comas, Universitat Rovira i Virgili, Spain
Mark Strembeck, WU Vienna, Austria
Jakub Szefer, Yale University, United States
Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany
Simon Tjoa, St. Pölten University of Applied Sciences, Austria
Emmanouil Vasilomanolakis, TU Darmstadt Germany
Umberto Villano, Universita’ del Sannio, Italy
Corrado Aaron, Visaggio Univeristà del Sannio, Italy
Xiao Wang, Carnegie Mellon University, United States
Christos Xenakis, University of Piraeus, Greece
Nicola Zannone, Eindhoven University of Technology, Netherlands
***
TOPCIS of interest include, but are not limited to:
***
Authorization, Authentication, and Access Control
Availability, Dependability, and Resilience
Botnets and Botnet Monitoring
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications
Dependability Aspects of e-Government
Dependability and Resilience in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding and Steganograhpy
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues related to Security and Privacy
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security
Privacy-Enhancing Technologies
Process based Security Models and Methods
Resilience and Security for Critical Infrastructures
Resilience of Computing Systems
Resilience, Security, and Privacy for Smart Grids
Resilience, Security, and Privacy for the Internet of Things
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security and Privacy for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
Wireless Security
Other CFPs
- 26th Signal Processing and Communications Applications Conference
- 9th International Workshop on Human-Computer Interaction, Tourism and Cultural Heritage: Strategies for a Creative Future with Computer Science, Quality Design and Communicability :: Genoa, Italy :: 19 - 21 September, 2018
- 7thInternational Conference on Information Technology Convergence and Services (ITCSE 2018)
- 9th World Congress on Bioavailability and Bioequivalence
- Global Summit on Medicinal Chemistry 2018
Last modified: 2018-01-10 10:51:53