ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.
Topics: Authorization, Authentication, and Access Control, Availability, Dependability, and Resilience, Botnets and Botnet Monitoring, Business Continuity & Resilience, Cost/Benefit Analysis, Cryptography, Dependability Aspects for Special Applications, Dependability Aspects of e-Government, Dependability and Resilience in Open Source Software, Designing Security Requirements, Digital Forensics, E-Commerce Dependability, Identity Management, IPR of Security Technology, Incident Response and Prevention, Information Flow Control, Information Hiding and Steganography, Interoperability Aspects, Intrusion Detection and Fraud Detection, Legal Issues related to Security and Privacy, Mobile Security, Network and Organizational Vulnerability Analysis, Network Security, Privacy-Enhancing Technologies, Process based Security Models and Methods, Resilience and Security for Critical Infrastructures, Resilience of Computing Systems, Resilience, Security, and Privacy for Smart Grids, Resilience, Security, and Privacy for the Internet of Things, RFID Security and Privacy, Risk planning, Analysis & Awareness, Safety Critical Systems, Secure Enterprise Architectures, Security and Privacy for Ubiquitous Systems, Security and Privacy in E-Health, Security and Trust Management in P2P and Grid applications, Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications, Security and Usability, Security as Quality of Service, Security in Distributed Systems / Distributed Databases, Security in Electronic Payments, Security in Electronic Voting, Software Engineering of Dependable Systems, Software Security, Threats and Attack Modelling, Trusted Computing, Tools for Dependable System Design and Evaluation, Trust Models and Trust Management, Wireless Security