websecurity@lists.webappsec.org

The Web Security Mailing List

View all threads

ARES 2015 - extended Deadline March 9, 2015

YP
Yvonne Poul
Fri, Mar 6, 2015 3:09 PM

ARES 2015 - CALL FOR PAPERS



The Tenth International Conference on Availability, Reliability and Security
(ARES 2015)

August 24th – 28th, 2015, Toulouse, France

http://www.ares-conference.eu

Sumission Deadline: extended to March 9, 2015




ARES CONFERENCE


The 10th International Conference on Availability, Reliability and Security
(“ARES”) will bring together researchers and practitioners in the area of
dependability. ARES will highlight the various aspects of security - with
special focus on the crucial linkage between availability, reliability and
security.

ARES aims at a full and detailed discussion of the research issues of
security as an integrative concept that covers amongst others availability,
safety, confidentiality, integrity, maintainability and security in the
different fields of applications.

ARES will emphasize the interplay between foundations and practical issues
of security in emerging areas such as e-government, m-government,
location-based applications, ubiquitous computing, autonomous computing,
chances of grid computing etc. ARES is devoted to the critical examination
and research challenges of the various aspects of Secure and Dependable
Computing and the definition of a future road map.

Selected papers that are accepted by and presented at the ARES Conference
will be published, after further revision, in special issues of
international journals. The acceptance rate of the ARES 2014 conference was
16%. The ARES conferences have been published by IEEE CPS.


CONFERENCE OFFICERS


General Chair

Abdelmalek Benzekri, Université Paul Sabatier, France

Program Committee Chair

Stefan Katzenbeisser, TU Darmstadt, Germany


KEYNOTE SPEAKERS


Peter Eckersley, EFF, US

Rainer Böhme, University of Innsbruck, Austria

Pierangela Samarati, Università degli Studi di Milano, Italy

(tutorials will be announced soon)


IMPORTANT DATES


Submission Deadline: March 2, 2015 (extended to March 9, 2015)

Author Notification: May 11, 2015

Proceedings Version: June 8, 2015

Conference: August 24-28, 2015


SUBMISSION


The proceedings of ARES (including workshops) have been published by
Conference Publishing Services (CPS) of IEEE. Authors of selected papers
that are accepted by and presented at the ARES Conference (including
workshops) will be invited to submit an extended version to special issues
of international journals.

Authors are invited to submit research and application papers according the
following guidelines: two columns, single-spaced, including figures and
references, using 10 pt fonts and number each page.

For the main conference as well as the workshops submission papers are
classified into 3 categorizes representing original, previously unpublished
work:

full paper (10 pages)

short paper (6 pages)

workshop paper (8 pages, a maximum of 10 pages is tolerated)

Submitted papers will be carefully evaluated based on originality,
significance, technical soundness, presentation and clarity of exposition.

Simultaneous submission of the same work to multiple venues, submission of
previously published work, or plagiarism constitutes dishonesty or fraud.
ARES, like other scientific and technical conferences and journals,
prohibits these practices and may take action against authors who have
committed them.

Double blind review: ARES requires anonymized submissions – please make sure
that submitted papers contain no author names or obvious self-references.


PROGRAM COMMITTEE


Jon A. Solworth, University of Illinois at Chicago, US

Isaac Agudo, University of Malaga, Spain

Philipp Amann, European Cybercrime Centre, Netherlands

Amin Anjomshoaa, Massachusetts Institute of Technology (MIT), US

Aslan Askarov, Aarhus University, Denmark

Ravishankar Borgaonkar, Technische Universität Berlin, Germany

Stephane Bressan, National University of Singapore, Singapore

Luanne Burns Goldrich, The Johns Hopkins University Applied Physics
Laboratory, US

Mario Cagalj, University of Split, Croatia

Lasaro Camargos, Federal University of Uberlandia, Brazil

Jordi Castellà-Roca, Rovira i Virgili University of Tarragona, Spain

Lorenzo Cavallaro, Royal Holloway, University of London, UK

David Chadwick, University of Kent, UK

Soon Ae Chun, City University of New York, US

Nathan Clarke, University of Plymouth, UK

Marijke Coetzee, University of Johannesburg, South Africa

Vincenzo De Florio, PATS / Universiteit Antwerpen and PATS / iMinds, Belgium

Steven Demurjian, University of Connecticut, US

Mark Dillon, International Criminal Court, Netherlands

Adam Doupé, Arizona State University, US

Pavlos Efraimidis, Democritus University of Thrace, Greece

Manuel Egele, Carnegie Mellon University, US

Christian Engelmann, Oak Ridge National Laboratory, US

Aristide Fattori, Università degli Studi di Milano, Italy

Hannes Federrath, University of Hamburg, Germany

Christophe Feltus, Luxembourg Institute of Science and Technology (LIST),
Luxembourg

Simone Fischer-Huebner, Karlstad University, Sweden

Francesco Flammini, Ansaldo STS, Italy

Steven Furnell, Plymouth University, UK

Karl Goeschka, Vienna University of Technology, Austria

Nico Golde, Qualcomm Research Germany

Marcin Gorawski, Wroclaw University of Technology and Silesian University of
Technology, Poland

Bogdan Groza, Politehnica University of Timisoara, Romania

Marit Hansen, Independent Centre for Privacy Protection, Kiel

Connie Heitmeyer, Naval Research Laboratory, USA

Dominik Herrmann, University Hamburg, Germany

Martin Gilje Jaatun, SINTEF, Norway

Hai Jin, Huazhong University of Science and Technology, China

Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany

Sokratis K. Katsikas, University of Piraeus, Greece

Vasilis Katos, University of Thrace, Greece

Peter Kieseberg, SBA Research, Austria

Ezzat Kirmani, St. Cloud State University, US

Thomas Korak, Graz University of Technology, Austria

Thorsten Kramp, IBM Research Zurich, Switzerland

Ralf Kuesters, University of Trier, Germany

Costas Lambrinoudakis, University of Piraeus, Greece

Corrado Leita, Symantec Research Labs, France

Shujun Li, University of Surrey, UK

Giovanni Livraga, Universita’ degli Studi di Milano, Italy

Javier Lopez, University of Malaga, Spain

Konstantinos Markantonakis, Royal Holloway and Bedford New College, UK

Keith Martin, Royal Holloway, University of London, UK

Ioannis Mavridis, University of Macedonia, Greece

Wojciech Mazurczyk, Warsaw University of Technology, Poland

Todd McDonald, University of South Alabama, US

Katerina Mitrokotsa, Chalmers University of Technology, Sweden

Mattia Monga, Universita` degli Studi di Milano, Italy

Haris Mouratidis, University of Brighton, UK

Thomas Moyer, MIT Lincoln Laboratory

Alexios Mylonas, Staffordshire University, UK

Thomas Nowey, Krones AG, Germany

Christoforos Ntantogian, University of Piraeus, Greece

Rolf Oppliger, eSecurity Technologies, Switzerland

Jaehong Park, University of Texas at San Antonio

Günther Pernul, University of Regensburg, Germany

Andreas Peter, University of Twente, Netherlands

Todd R. Andel, University of South Alabama, US

Stefanie Rinderle-Ma, University of Vienna, Austria

Domenico Rosaci, University “Mediterranea” of Reggio Calabria, Italy

Volker Roth, Freie Universitaet Berlin, Germany

Giovanni Russello, University of Auckland, New Zealand

Luis Enrique Sánchez Crespo, University of Armed Forced, University of
Castilla-la Mancha, Spain

Mark Scanlon, University College Dublin, Ireland

Sebastian Schinzel, Münster University of Applied Sciences, Germany

Jörn-Marc Schmidt, secunet, Germany

Max Schuchard, University of Minnesota, US

Stefan Schulte, Vienna University of Technology, Austria

Dimitris Simos, SBA Research, Austria

Mark Strembeck, Vienna University of Economics and Business, Austria

Gianluca Stringhini, Univerity College London, UK

Thorsten Strufe, TU Dresden, Germany

Jakub Szefer, Yale School of Engineering & Applied Science, US

Laurence T. Yang, St Francis Xavier University, Canada

Tsuyoshi Takagi, Kyushu University, Japan

Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany

Umberto Villano, Universita’ del Sannio, Italy

Cong Wang, City University of Hong Kong, Hong Kong

Lenx Wei, Peking University, China

Jinpeng Wei, Florida International University, US

Erich Wenger, IAIK TU Graz, Austria

Christos Xenakis, University of Piraeus, Greece

Fabian Yamaguchi, University of Göttingen, Germany

Alec Yasinsac, University of South Alabama, US

Nicola Zannone, Eindhoven University of Technology, The Netherlands


TOPCIS of interest include, but are not limited to:


Authorization and Authentication

Availability and Reliability

Business Continuity & Resilience

Cost/Benefit Analysis

Cryptography

Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)

Dependability Aspects of Electronic Government (e-Government)

Dependability Administration

Dependability in Open Source Software

Designing Security Requirements

Digital Forensics

E-Commerce Dependability

Failure Prevention

Identity Management

IPR of Security Technology

Incident Response and Prevention

Information Flow Control

Information Hiding

Internet Dependability

Interoperability Aspects

Intrusion Detection and Fraud Detection

Legal Issues

Mobile Security

Network and Organizational Vulnerability Analysis

Network Security                          Privacy-Enhancing Technologies

Process based Security Models and Methods

RFID Security and Privacy

Risk planning, Analysis & Awareness

Safety Critical Systems

Secure Enterprise Architectures

Security Issues for Ubiquitous Systems

Security and Privacy in E-Health

Security and Trust Management in P2P and Grid applications

Security and Privacy for Sensor Networks, Wireless/Mobile Devices and
Applications

Security and Usability

Security as Quality of Service

Security in Distributed Systems / Distributed Databases

Security in Electronic Payments

Security in Electronic Voting

Software Engineering of Dependable Systems

Software Security

Standards, Guidelines and Certification

Survivability of Computing Systems

Temporal Aspects of Dependability

Threats and Attack Modelling

Trusted Computing

Tools for Dependable System Design and Evaluation

Trust Models and Trust Management

VOIP, Wireless Security

Best regards,
Edgar Weippl.

PS: Conferences organized by SBA Research:

ACM SACMAT 2015 – June 1-3, 2015, Vienna, Austria,  http://www.sacmat.org/
http://www.sacmat.org/
ESORICS 2015 – September 21-25, 2015 (Submission Deadline: April 4, 2015)
Vienna, Austria,  http://esorics2015.sba-research.org/
http://esorics2015.sba-research.org/
CCS 2016 – October 24-28, 2016, Vienna, Austria

Edgar R. Weippl                  mailto:eweippl@sba-research.org
eweippl@sba-research.org
Research Director              T: +43 1 5053688
http://www.sba-research.org/ http://www.sba-research.org/    F: +43 1
5047881
http://www.ares-conference.eu/ http://www.ares-conference.eu

Follow us on Twitter ( http://twitter.com/#%21/ARES_Conference/
http://twitter.com/#!/ARES_Conference/)
Find us on Facebook ( https://www.facebook.com/AresConference
https://www.facebook.com/AresConference)

ARES 2015 - CALL FOR PAPERS **************************************************************************** ************** The Tenth International Conference on Availability, Reliability and Security (ARES 2015) August 24th – 28th, 2015, Toulouse, France http://www.ares-conference.eu Sumission Deadline: extended to March 9, 2015 **************************************************************************** ************** *********** ARES CONFERENCE ************ The 10th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map. Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals. The acceptance rate of the ARES 2014 conference was 16%. The ARES conferences have been published by IEEE CPS. ************ CONFERENCE OFFICERS ************ General Chair Abdelmalek Benzekri, Université Paul Sabatier, France Program Committee Chair Stefan Katzenbeisser, TU Darmstadt, Germany ************ KEYNOTE SPEAKERS ************ Peter Eckersley, EFF, US Rainer Böhme, University of Innsbruck, Austria Pierangela Samarati, Università degli Studi di Milano, Italy (tutorials will be announced soon) ************ IMPORTANT DATES ************ Submission Deadline: March 2, 2015 (extended to March 9, 2015) Author Notification: May 11, 2015 Proceedings Version: June 8, 2015 Conference: August 24-28, 2015 ************ SUBMISSION ************ The proceedings of ARES (including workshops) have been published by Conference Publishing Services (CPS) of IEEE. Authors of selected papers that are accepted by and presented at the ARES Conference (including workshops) will be invited to submit an extended version to special issues of international journals. Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page. For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work: full paper (10 pages) short paper (6 pages) workshop paper (8 pages, a maximum of 10 pages is tolerated) Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition. Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references. ************ PROGRAM COMMITTEE ************ Jon A. Solworth, University of Illinois at Chicago, US Isaac Agudo, University of Malaga, Spain Philipp Amann, European Cybercrime Centre, Netherlands Amin Anjomshoaa, Massachusetts Institute of Technology (MIT), US Aslan Askarov, Aarhus University, Denmark Ravishankar Borgaonkar, Technische Universität Berlin, Germany Stephane Bressan, National University of Singapore, Singapore Luanne Burns Goldrich, The Johns Hopkins University Applied Physics Laboratory, US Mario Cagalj, University of Split, Croatia Lasaro Camargos, Federal University of Uberlandia, Brazil Jordi Castellà-Roca, Rovira i Virgili University of Tarragona, Spain Lorenzo Cavallaro, Royal Holloway, University of London, UK David Chadwick, University of Kent, UK Soon Ae Chun, City University of New York, US Nathan Clarke, University of Plymouth, UK Marijke Coetzee, University of Johannesburg, South Africa Vincenzo De Florio, PATS / Universiteit Antwerpen and PATS / iMinds, Belgium Steven Demurjian, University of Connecticut, US Mark Dillon, International Criminal Court, Netherlands Adam Doupé, Arizona State University, US Pavlos Efraimidis, Democritus University of Thrace, Greece Manuel Egele, Carnegie Mellon University, US Christian Engelmann, Oak Ridge National Laboratory, US Aristide Fattori, Università degli Studi di Milano, Italy Hannes Federrath, University of Hamburg, Germany Christophe Feltus, Luxembourg Institute of Science and Technology (LIST), Luxembourg Simone Fischer-Huebner, Karlstad University, Sweden Francesco Flammini, Ansaldo STS, Italy Steven Furnell, Plymouth University, UK Karl Goeschka, Vienna University of Technology, Austria Nico Golde, Qualcomm Research Germany Marcin Gorawski, Wroclaw University of Technology and Silesian University of Technology, Poland Bogdan Groza, Politehnica University of Timisoara, Romania Marit Hansen, Independent Centre for Privacy Protection, Kiel Connie Heitmeyer, Naval Research Laboratory, USA Dominik Herrmann, University Hamburg, Germany Martin Gilje Jaatun, SINTEF, Norway Hai Jin, Huazhong University of Science and Technology, China Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany Sokratis K. Katsikas, University of Piraeus, Greece Vasilis Katos, University of Thrace, Greece Peter Kieseberg, SBA Research, Austria Ezzat Kirmani, St. Cloud State University, US Thomas Korak, Graz University of Technology, Austria Thorsten Kramp, IBM Research Zurich, Switzerland Ralf Kuesters, University of Trier, Germany Costas Lambrinoudakis, University of Piraeus, Greece Corrado Leita, Symantec Research Labs, France Shujun Li, University of Surrey, UK Giovanni Livraga, Universita’ degli Studi di Milano, Italy Javier Lopez, University of Malaga, Spain Konstantinos Markantonakis, Royal Holloway and Bedford New College, UK Keith Martin, Royal Holloway, University of London, UK Ioannis Mavridis, University of Macedonia, Greece Wojciech Mazurczyk, Warsaw University of Technology, Poland Todd McDonald, University of South Alabama, US Katerina Mitrokotsa, Chalmers University of Technology, Sweden Mattia Monga, Universita` degli Studi di Milano, Italy Haris Mouratidis, University of Brighton, UK Thomas Moyer, MIT Lincoln Laboratory Alexios Mylonas, Staffordshire University, UK Thomas Nowey, Krones AG, Germany Christoforos Ntantogian, University of Piraeus, Greece Rolf Oppliger, eSecurity Technologies, Switzerland Jaehong Park, University of Texas at San Antonio Günther Pernul, University of Regensburg, Germany Andreas Peter, University of Twente, Netherlands Todd R. Andel, University of South Alabama, US Stefanie Rinderle-Ma, University of Vienna, Austria Domenico Rosaci, University “Mediterranea” of Reggio Calabria, Italy Volker Roth, Freie Universitaet Berlin, Germany Giovanni Russello, University of Auckland, New Zealand Luis Enrique Sánchez Crespo, University of Armed Forced, University of Castilla-la Mancha, Spain Mark Scanlon, University College Dublin, Ireland Sebastian Schinzel, Münster University of Applied Sciences, Germany Jörn-Marc Schmidt, secunet, Germany Max Schuchard, University of Minnesota, US Stefan Schulte, Vienna University of Technology, Austria Dimitris Simos, SBA Research, Austria Mark Strembeck, Vienna University of Economics and Business, Austria Gianluca Stringhini, Univerity College London, UK Thorsten Strufe, TU Dresden, Germany Jakub Szefer, Yale School of Engineering & Applied Science, US Laurence T. Yang, St Francis Xavier University, Canada Tsuyoshi Takagi, Kyushu University, Japan Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany Umberto Villano, Universita’ del Sannio, Italy Cong Wang, City University of Hong Kong, Hong Kong Lenx Wei, Peking University, China Jinpeng Wei, Florida International University, US Erich Wenger, IAIK TU Graz, Austria Christos Xenakis, University of Piraeus, Greece Fabian Yamaguchi, University of Göttingen, Germany Alec Yasinsac, University of South Alabama, US Nicola Zannone, Eindhoven University of Technology, The Netherlands ************ TOPCIS of interest include, but are not limited to: ************ Authorization and Authentication Availability and Reliability Business Continuity & Resilience Cost/Benefit Analysis Cryptography Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics) Dependability Aspects of Electronic Government (e-Government) Dependability Administration Dependability in Open Source Software Designing Security Requirements Digital Forensics E-Commerce Dependability Failure Prevention Identity Management IPR of Security Technology Incident Response and Prevention Information Flow Control Information Hiding Internet Dependability Interoperability Aspects Intrusion Detection and Fraud Detection Legal Issues Mobile Security Network and Organizational Vulnerability Analysis Network Security Privacy-Enhancing Technologies Process based Security Models and Methods RFID Security and Privacy Risk planning, Analysis & Awareness Safety Critical Systems Secure Enterprise Architectures Security Issues for Ubiquitous Systems Security and Privacy in E-Health Security and Trust Management in P2P and Grid applications Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications Security and Usability Security as Quality of Service Security in Distributed Systems / Distributed Databases Security in Electronic Payments Security in Electronic Voting Software Engineering of Dependable Systems Software Security Standards, Guidelines and Certification Survivability of Computing Systems Temporal Aspects of Dependability Threats and Attack Modelling Trusted Computing Tools for Dependable System Design and Evaluation Trust Models and Trust Management VOIP, Wireless Security Best regards, Edgar Weippl. PS: Conferences organized by SBA Research: ACM SACMAT 2015 – June 1-3, 2015, Vienna, Austria, <http://www.sacmat.org/> http://www.sacmat.org/ ESORICS 2015 – September 21-25, 2015 (Submission Deadline: April 4, 2015) Vienna, Austria, <http://esorics2015.sba-research.org/> http://esorics2015.sba-research.org/ CCS 2016 – October 24-28, 2016, Vienna, Austria Edgar R. Weippl <mailto:eweippl@sba-research.org> eweippl@sba-research.org Research Director T: +43 1 5053688 <http://www.sba-research.org/> http://www.sba-research.org/ F: +43 1 5047881 <http://www.ares-conference.eu/> http://www.ares-conference.eu Follow us on Twitter ( <http://twitter.com/#%21/ARES_Conference/> http://twitter.com/#!/ARES_Conference/) Find us on Facebook ( <https://www.facebook.com/AresConference> https://www.facebook.com/AresConference)