[MEXT] ARES 2012 - We are looking forward to YOUR submissions!
"Yvonne Poul" <email@example.com> Mon, 20 February 2012 11:40 UTC
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3F5621F84A6 for <firstname.lastname@example.org>; Mon, 20 Feb 2012 03:40:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Status: No, score=0.002 tagged_above=-999 required=5 tests=[BAYES_50=0.001, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([184.108.40.206]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4gyZvjYL4Wql for <email@example.com>; Mon, 20 Feb 2012 03:40:06 -0800 (PST)
Received: from mx17lb.world4you.com (mx17lb.world4you.com [IPv6:2a00:1a68:1:101::1b1b:17]) by ietfa.amsl.com (Postfix) with ESMTP id 0586721F864E for <firstname.lastname@example.org>; Mon, 20 Feb 2012 03:40:05 -0800 (PST)
Received: from [220.127.116.11] (helo=NBATVIE050) by mx17lb.world4you.com with esmtpa (Exim 4.77) (envelope-from <email@example.com>) id 1RzRb8-00029f-Df for firstname.lastname@example.org; Mon, 20 Feb 2012 12:40:03 +0100
From: "Yvonne Poul" <email@example.com>
Date: Mon, 20 Feb 2012 12:40:00 +0100
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0078_01CCEFCC.C3E40810"
X-Mailer: Microsoft Outlook 14.0
X-SA-Exim-Scanned: No (on mx17lb.world4you.com); SAEximRunCond expanded to false
Subject: [MEXT] ARES 2012 - We are looking forward to YOUR submissions!
List-Id: Mobile IPv6 EXTensions WG <mext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mext>, <mailto:firstname.lastname@example.org?subject=unsubscribe>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mext>, <mailto:email@example.com?subject=subscribe>
X-List-Received-Date: Mon, 20 Feb 2012 11:40:14 -0000
Call for Papers The 7th International Conference on Availability, Reliability and Security (AReS 2012) http://www.ares-conference.eu University of Economics in Prague, Czech Republic August 20th - 24th, 2012 Conference The 7th International Conference on Availability, Reliability and Security ("ARES") will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map. Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals. Important Dates Submission Deadline: March 1st, 2012 Author Notification: May 1st, 2012 Author Registration: May 18th, 2012 Proceedings Version: June 1st, 2012 Conference: August 20th - 24th, 2012 Conference Officers Program Committee Co-Chairs * Elisa Bertino, Purdue University, USA * A Min Tjoa, Vienna University of Technology, Austria Workshop Co-Chairs * Gerald Quirchmayr, University of South Australia, Australia * A Min Tjoa, Vienna University of Technology, Austria Topics of interest include, but are not limited to: Authorization and Authentication Availability and Reliability Business Continuity & Resilience Cost/Benefit Analysis Cryptography Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics) Dependability Aspects of Electronic Government (e-Government) Dependability Administration Dependability in Open Source Software Designing Security Requirements Digital Forensics E-Commerce Dependability Failure Prevention Identity Management IPR of Security Technology Incident Response and Prevention Information Flow Control Information Hiding Internet Dependability Interoperability Aspects Intrusion Detection and Fraud Detection Legal Issues Mobile Security Network and Organizational Vulnerability Analysis Network Security Privacy-Enhancing Technologies Process based Security Models and Methods RFID Security and Privacy Risk planning, Analysis & Awareness Safety Critical Systems Secure Enterprise Architectures Security Issues for Ubiquitous Systems Security and Privacy in E-Health Security and Trust Management in P2P and Grid applications Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications Security and Usability Security as Quality of Service Security in Distributed Systems / Distributed Databases Security in Electronic Payments Security in Electronic Voting Software Engineering of Dependable Systems Software Security Standards, Guidelines and Certification Survivability of Computing Systems Temporal Aspects of Dependability Threats and Attack Modelling Trusted Computing Tools for Dependable System Design and Evaluation Trust Models and Trust Management VOIP, Wireless Security We are looking forward to your submission! If you have any questions do not hesitate to contact us: firstname.lastname@example.org Best regards Yvonne Poul ARES Organizing Team SBA Research Office: Sommerpalais Harrach / Favoritenstr. 16 / 1040 Wien Mobil: +43 699 100 41 066 E: <mailto:email@example.com> firstname.lastname@example.org <http://www.ares-conference.eu> http://www.ares-conference.eu