-------- Weitergeleitete Nachricht -------- Betreff: [computational.science] ARES EU PROJECTS SYMPOSUM 2016 - Call for Workshops Datum: Thu, 11 Feb 2016 13:31:16 +0000 Von: res.mb.conference conference@sba-research.org An: Computational Science Mailing List computational.science@lists.iccsa.org
ARES EU PROJECTS SYMPOSUM 2016 - CALL FOR WORKSHOPS
****************************************************************************************** The 11th International Conference on Availability, Reliability and Security
(ARES 2016) August 31 - September 2, 2016, Salzburg, Austria http://www.ares-conference.eu/conference/ares-eu-symposium/ ******************************************************************************************
*********** ARES EU SYMPOSIUM ************ The 11th International Conference on Availability, Reliability and Security (ARES) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security. Based on the success of the ARES EU Projects Symposium 2015 we cordially invite EU project partners to organize a workshop at the ARES EU Projects Symposium 2016.
The ARES EU Symposium will be held in conjunction with ARES 2016 and will offer you the following opportunities: * Disseminate the results of your EU research projects (Horizon 2020, FP7, ERA-NET, ITEA, COST) * Meet potential project partners * Exchange ideas within the scientific community * Explore Salzburg
************ CONFERENCE OFFICERS ************ General Chair Dominik Engel, Salzburg University of Applied Sciences, Austria Program Committee Chairs Stephen B. Wicker, Cornell University, USA Dominik Engel, Salzburg University of Applied Sciences, Austria
************ IMPORTANT DATES ************ Proposal Submission Deadline: February 29, 2016 Workshop Proposal Notification: 2 weeks after submission of proposal Proceedings Version: June 20, 2016 Conference: August 31 - September 2, 2016
Tentative Schedule: 09:00 - 10:30 Symposium sessions 10:30 - 11:00 Coffee break 11:00 - 12:30 Symposium sessions 12:30 - 14:00 Lunch 14:00 - 16:00 Consortium meetings / ARES sessions / free time for sightseeing 16:00 - 18:00 Networking / poster session 18:00 Networking Event (meet ARES participants)
************ SUBMISSION ************ Proposals should include following items: * Organisational Information o Name and affiliation of organisers o Name of the project and link to website o Programme: Horizon 2020, FP7, ERA-NET, ITEA, COST o List of project partners that you intend to invite o Open / Closed session: Can researchers related to the topics that are not in the consortium (1) attend and/or (2) submit to the session? * Content o Project abstract o Short description of the planned symposium session
If the papers should be published by CPS (IEEE Xplore Digital Library) please address also following items: * Programme committee * Planned review process. The acceptance rate should be less than 40%.
Please send your proposal to Shadya Ayoub (sayoub@sba-research.orgmailto:sayoub@sba-research.org) by February 29, 2016.
************ TOPCIS of interest include, but are not limited to: ************ Authorization and Authentication Availability and Reliability Business Continuity & Resilience Cost/Benefit Analysis Cryptography Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics) Dependability Aspects of Electronic Government (e-Government) Dependability Administration Dependability in Open Source Software Designing Security Requirements Digital Forensics E-Commerce Dependability Failure Prevention Identity Management IPR of Security Technology Incident Response and Prevention Information Flow Control Information Hiding Internet Dependability Interoperability Aspects Intrusion Detection and Fraud Detection Legal Issues Mobile Security Network and Organizational Vulnerability Analysis Network Security Privacy-Enhancing Technologies Process based Security Models and Methods RFID Security and Privacy Risk planning, Analysis & Awareness Safety Critical Systems Secure Enterprise Architectures Security Issues for Ubiquitous Systems Security and Privacy in E-Health Security and Trust Management in P2P and Grid applications Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications Security and Usability Security as Quality of Service Security in Distributed Systems / Distributed Databases Security in Electronic Payments Security in Electronic Voting Software Engineering of Dependable Systems Software Security Standards, Guidelines and Certification Survivability of Computing Systems Temporal Aspects of Dependability Threats and Attack Modelling Trusted Computing Tools for Dependable System Design and Evaluation Trust Models and Trust Management VOIP, Wireless Security