<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html><head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<META name=Generator content=7.03> <title>Invitation to submit a paper to ARES 2013 - Regensburg, Germany (2-6 Sept. 2013)</title>
</head>
<body bgColor=#ffffff> <P align=center><STRONG><FONT size=4>Call for Papers</FONT></STRONG></p><p align=center><STRONG><FONT color=#800000 size=4>The Eighth International Conference on Availability, Reliability and Security (AReS 2013)</FONT></STRONG></p><p align=center>September 2-6, 2013 <A href="http://www.ares-conference.eu/">http://www.ares-conference.eu</A></p><p align=left><BR></p><p align=left>We would like to invit you to submit a paper to ARES 2013 - held from 2nd - 6th September 2013 in Regensburg, Germany.</p><p align=left>The 8th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security.<BR>ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.<BR>ARES is ranked as B-conference in CORE (<A href="http://core.edu.au/cms/images/downloads/conference/08sort%20acronymERA2010_conference_list.pdf">http://core.edu.au/cms/images/downloads/conference/08sort%20acronymERA2010_conference_list.pdf</A>) and is currently ranked 17th on the Google Scholar list of all Computer Security & Cryptography publications based on the h5-index ranking (<A href="http://scholar.google.com/citations?view_op=top_venues&hl=en&vq=eng_computersecuritycryptography">http://scholar.google.com/citations?view_op=top_venues&hl=en&vq=eng_computersecuritycryptography</A>).<BR> <BR>Submission Deadline: <STRONG>March 1st, 2013</STRONG><BR>Author Notification: May 1st, 2013<BR>Author Registration: May 18th, 2013<BR>Proceedings Version: June 1st, 2013<BR>Conference: <STRONG>September 2nd - 6th, 2013</STRONG><BR>Venue: University of Regensburg, Germany</p><p align=left><STRONG>Submission: </STRONG>To submit a paper please visit our Submission Site at <A href="http://www.ares-conference.eu">www.ares-conference.eu</A>. <BR> <BR><STRONG>Program Committee Co-Chairs</STRONG><BR>• Günther Pernul, University of Regensburg, Gemany<BR>• Ravi Sandhu, University of Texas at San Antonio, United States</p><p align=left><STRONG>Keynote Speakers</STRONG><BR>• Elena Ferrari, Director DiSTA STRICT SociaLab, University of Insubria, Italy<BR>• Carl Gunter, Department of Computer Science, University of Illinois at Urbana-Champaign, USA</p><p align=left>Complete Conference Committee available at <A href="http://bit.ly/YlsaBw">http://bit.ly/YlsaBw</A></p><p align=left><STRONG>Topics of interest include, but are not limited to:</STRONG><BR><FONT size=2>Authorization and Authentication<BR>Availability and Reliability<BR>Business Continuity & Resilience<BR>Cost/Benefit Analysis<BR>Cryptography<BR>Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)<BR>Dependability Aspects of Electronic Government (e-Government)<BR>Dependability Administration<BR>Dependability in Open Source Software<BR>Designing Security Requirements<BR>Digital Forensics<BR>E-Commerce Dependability<BR>Failure Prevention<BR>Identity Management<BR>IPR of Security Technology<BR>Incident Response and Prevention<BR>Information Flow Control<BR>Information Hiding<BR>Internet Dependability<BR>Interoperability Aspects<BR>Intrusion Detection and Fraud Detection<BR>Legal Issues<BR>Mobile Security<BR>Network and Organizational Vulnerability Analysis<BR>Network Security Privacy-Enhancing Technologies<BR>Process based Security Models and Methods<BR>RFID Security and Privacy<BR>Risk planning, Analysis & Awareness<BR>Safety Critical Systems<BR>Secure Enterprise Architectures<BR>Security Issues for Ubiquitous Systems<BR>Security and Privacy in E-Health<BR>Security and Trust Management in P2P and Grid applications<BR>Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications<BR>Security and Usability<BR>Security as Quality of Service<BR>Security in Distributed Systems / Distributed Databases<BR>Security in Electronic Payments<BR>Security in Electronic Voting<BR>Software Engineering of Dependable Systems<BR>Software Security<BR>Standards, Guidelines and Certification<BR>Survivability of Computing Systems<BR>Temporal Aspects of Dependability<BR>Threats and Attack Modelling<BR>Trusted Computing<BR>Tools for Dependable System Design and Evaluation<BR>Trust Models and Trust Management<BR>VOIP, Wireless Security <BR></FONT></p><p align=left>Looking forward to your submission!<BR>See you in Regensburg!</p><p align=left>Regards,<BR>Your ARES Conference Team</p><p align=left>SBA Research <BR>Office: Sommerpalais Harrach / Favoritenstr. 16 / 1040 Wien<BR>Mobil: +43 699 100 41 066<BR>E: <A href="mailto:office@ares-conference.eu">office@ares-conference.eu</A><BR><A href="http://www.ares-conference.eu">http://www.ares-conference.eu</A> </p><p align=left>Follow us on Twitter (<A href="http://twitter.com/#!/ARES_Conference/">http://twitter.com/#!/ARES_Conference/</A>)<BR>Find us on Facebook (<A href="https://www.facebook.com/AresConference">https://www.facebook.com/AresConference</A>)</P></body>
</html>