ARES 2017 - CALL FOR PAPERS ****************************************************************************************** The 12th International Conference on Availability, Reliability and Security (ARES 2017) August 29 – September 1, 2017, Reggio Calabria, Italy http://www.ares-conference.eu ****************************************************************************************** *********** ARES CONFERENCE ************ The 12th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map. Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals. The acceptance rate of the ARES 2016 conference was 24,42% (full papers only). The ARES conferences have been published by Conference Publishing Services (CPS). ************ CONFERENCE OFFICERS ************ General Chair Francesco Buccafurri, Università degli Studi Mediterranea di Reggio Calabria, Italy Program Committee Chairs Mathias Fischer, Universität Hamburg, Germany Max Mühlhäuser, TU Darmstadt, Germany ************ IMPORTANT DATES ************ Submission Deadline: extended to March 31, 2017 23:59 UTC-11 Author Notification: May 22, 2017 Proceedings Version: June 20, 2017 Conference: August 29 - September 1, 2017 ************ SUBMISSION ************ ARES 2017 will be published by the International Conference Proceedings Series published by ACM (ACM ICPS). Authors of selected papers that are accepted by and presented at the ARES Conference (including workshops) will be invited to submit an extended version to special issues of international journals. Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page. For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work: -full paper (10 pages) -short paper (6 pages) -workshop paper (8 pages, a maximum of 10 pages is tolerated) Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition. Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references. The ARES submission system (EasyChair) is available here: https://easychair.org/conferences/?conf=ares2017 ************ PROGRAM COMMITTEE ************ Isaac Agudo Ruiz, University of Malaga, Spain Todd R. Andel, University of South Alabama, US Francesco Buccafurri, University of Reggio Calabria, Italy Lasaro Camargos, Federal University of Uberlândia, Brazil David, Chadwick, University of Kent, UK Nathan Clarke, Plymouth University, UK Marijke Coetzee, University of Johannesburg, South Africa Jörg Daubert, TU Darmstadt, Germany Luca De Cicco, Politecnico di Bari, Italy José Maria de Fuentes, Carlos III University of Madrid, Spain Pavlos Efraimidis, Democritus University of Thrace, Greece Dominik Engel, Salzburg University of Applied Sciences, Austria Christian, Engelmann, Oak Ridge National Laboratory, US Hannes Federrath University of Hamburg, Germany Christophe, Feltus Luxembourg Institute of Science and Technology, Luxembourg Steven Furnell, Plymouth University, UK Joaquin Garcia-Alfaro, Télécom SudParis, France Karl Goeschka, Vienna University of Technology, Austria Nico Golde, Qualcomm Research Germany, Germany Lorena, Gonzalez-Manzano, Carlos III University of Madrid, Spain Bogdan Groza, Politehnica University of Timisoara, Romania Sheikh Mahbub Habib, TU Darmstadt, Germany Dominik Herrmann, University Hamburg, Germany Martin Gilje Jaatun, SINTEF, Norway Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany Sokratis K. Katsikas, University of Piraeus, Greece Peter Kieseberg, SBA Research, Austria Ezzat Kirmani, St. Cloud State University, US Ralf Kuesters, University of Trier, Germany Romain Laborde, University of Toulouse, France Costas Lambrinoudakis, University of Piraeus, Greece Shujun Li, University of Surrey, UK Giovanni Livraga, Universita' degli Studi di Milano, Italy Javier Lopez, University of Malaga, Spain Keith Martin, Royal Holloway, University of London, UK Barbara Masucci, University of Salerno, Italy Ioannis Mavridis, University of Macedonia, Greece Mattia Monga, Universita` degli Studi di Milano, Italy Haralambos Mouratidis, University of Brighton, UK Thomas Moyer, MIT Lincoln Laboratory, US Sebastian Neuner, SBA Research, Austria Thomas Nowey, Krones AG, Germany Christoforos Ntantogian, University of Piraeus, Greece Jaehong Park, University of Alabama in Huntsville, US Günther Pernul, University of Regensburg, Germany Andreas Peter, University of Twente, Netherlands Sriram Raghavan, University of Melbourne, Australia Stefanie Rinderle-Ma, Vienna University, Austria Stefanie Roos, University of Waterloo, Canada Michael Roßberg, TU Ilmenau, Germany Volker Roth, Freie Universität Berlin, Germany Giovanni Russello, University of Auckland, New Zealand Luis Enrique Sánchez Crespo, University of Castilla-la Mancha, Spain Mark Scanlon, University College Dublin, Ireland Sebastian Schinzel, FH Münster, Germany Jörn-Marc Schmidt, secunet, Germany Martin Schmiedecker, SBA Research, Austria Max Schuchard, University of Minnesota, US Stefan Schulte, Vienna University of Technology, Austria Daniele Sgandurra, Royal Holloway, University of London, UK Jon A. Solworth University of Illinois at Chicago, US Mark Strembeck, WU Vienna, Austria Jakub Szefer, Yale School of Engineering & Applied Science, US Oliver Theel Carl von Ossietzky, Universität Oldenburg, Germany Steven Van Acker, Chalmers University, Sweden Emmanouil, Vasilomanolakis, TU Darmstadt, Germany Umberto Villano, Universita' del Sannio, Italy Corrado Aaron, Visaggio, Univeristà del Sannio, Italy Artemios Voyiatzis, SBA Research, Austria Xiao Wang, Carnegie Mellon University ,US Christos Xenakis, University of Piraeus, Greece Alec Yasinsac, University of South Alabama, US Nicola Zannone, Eindhoven University of Technology, Netherlands *********** TOPCIS of interest include, but are not limited to: ************ Authorization, Authentication, and Access Control Availability, Dependability, and Resilience Botnets and Botnet Monitoring Business Continuity & Resilience Cost/Benefit Analysis Cryptography Dependability Aspects for Special Applications Dependability Aspects of e-Government Dependability and Resilience in Open Source Software Designing Security Requirements Digital Forensics E-Commerce Dependability Identity Management IPR of Security Technology Incident Response and Prevention Information Flow Control Information Hiding and Steganograhpy Interoperability Aspects Intrusion Detection and Fraud Detection Legal Issues related to Security and Privacy Mobile Security Network and Organizational Vulnerability Analysis Network Security Privacy-Enhancing Technologies Process based Security Models and Methods Resilience and Security for Critical Infrastructures Resilience of Computing Systems Resilience, Security, and Privacy for Smart Grids Resilience, Security, and Privacy for the Internet of Things RFID Security and Privacy Risk planning, Analysis & Awareness Safety Critical Systems Secure Enterprise Architectures Security and Privacy for Ubiquitous Systems Security and Privacy in E-Health Security and Trust Management in P2P and Grid applications Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications Security and Usability Security as Quality of Service Security in Distributed Systems / Distributed Databases Security in Electronic Payments Security in Electronic Voting Software Engineering of Dependable Systems Software Security Threats and Attack Modelling Trusted Computing Tools for Dependable System Design and Evaluation Trust Models and Trust Management Wireless Security