ogsa-wg
Threads by month
- ----- 2025 -----
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
March 2015
- 2 participants
- 3 discussions

CFP: CNSM 2015 - 11th International Conference on Network and Service Management
by Tortonesi Mauro 23 Mar '15
by Tortonesi Mauro 23 Mar '15
23 Mar '15
CALL FOR PAPERS - CNSM 2015
11th International Conference on Network and Service Management
November 9-13, 2015 - Barcelona, Spain
<http://www.cnsm-conf.org/2015/>
The 11th International Conference on Network and Service Management
(CNSM), is inviting authors to submit original contributions in the
network and service management research area.
CNSM 2015 is a selective single track conference covering all aspects
of the management of networks and services, pervasive systems,
enterprises, and cloud computing environments. The core track is
accompanied by a series of workshops, tutorials and poster sessions.
Papers accepted and presented at CNSM 2015 will be published open
access on the conference Web site (with IFIP copyright) and included
in the IFIP Digital Library. Authors of selected papers accepted for
publication in the CNSM 2015 proceedings will be invited to submit an
extended version of their paper to the IEEE Transactions on Network
and Service Management journal.
The timeline / deadlines for CNSM are as follows:
Paper submission: 2015-05-17
Rebuttal period: 2015-07-11 - 2015-07-17
Acceptance notification: 2015-07-31
Camera-ready paper: 2015-09-20
Conference: 2015-11-09 - 2015-11-13
We welcome your contributions and look forward to your participation
at CNSM 2015. For further details, see <http://www.cnsm-conf.org/2015/>.
Information about past editions of CNSM can be found at
<http://www.cnsm-conf.org/>.
------------------------------------------------------------------------
General Co-Chairs
- Joan Serrat, Universitat Politècnica de Catalunya, Spain
Technical Program Co-Chairs
- Mauro Tortonesi, University of Ferrara, Italy
- Juergen Schoenwaelder, Jacobs University Bremen, Germany
Steering Committee
- Raouf Boutaba, University of Waterloo, Canada
- Marcus Brunner, Swisscom, Switzerland
- Prosper Chemouil, Orange Labs, France
- James Hong, POSTECH, Korea
- Deep Medhi, University of Missouri-Kansas City, USA
- Aiko Pras, University of Twente, The Netherlands
- Doug Zuckerman, Applied Communication Sciences, USA
--
Mauro Tortonesi, Ph.D.
Assistant Professor
Distributed Systems Research Group
Engineering Department
University of Ferrara
1
0
ARES 2015 - CALL FOR PAPERS
****************************************************************************
**************
The Tenth International Conference on Availability, Reliability and Security
(ARES 2015)
August 24th 28th, 2015, Toulouse, France
http://www.ares-conference.eu
Sumission Deadline: extended to March 9, 2015
****************************************************************************
**************
***********
ARES CONFERENCE
************
The 10th International Conference on Availability, Reliability and Security
(ARES) will bring together researchers and practitioners in the area of
dependability. ARES will highlight the various aspects of security - with
special focus on the crucial linkage between availability, reliability and
security.
ARES aims at a full and detailed discussion of the research issues of
security as an integrative concept that covers amongst others availability,
safety, confidentiality, integrity, maintainability and security in the
different fields of applications.
ARES will emphasize the interplay between foundations and practical issues
of security in emerging areas such as e-government, m-government,
location-based applications, ubiquitous computing, autonomous computing,
chances of grid computing etc. ARES is devoted to the critical examination
and research challenges of the various aspects of Secure and Dependable
Computing and the definition of a future road map.
Selected papers that are accepted by and presented at the ARES Conference
will be published, after further revision, in special issues of
international journals. The acceptance rate of the ARES 2014 conference was
16%. The ARES conferences have been published by IEEE CPS.
************
CONFERENCE OFFICERS
************
General Chair
Abdelmalek Benzekri, Université Paul Sabatier, France
Program Committee Chair
Stefan Katzenbeisser, TU Darmstadt, Germany
************
KEYNOTE SPEAKERS
************
Peter Eckersley, EFF, US
Rainer Böhme, University of Innsbruck, Austria
Pierangela Samarati, Università degli Studi di Milano, Italy
(tutorials will be announced soon)
************
IMPORTANT DATES
************
Submission Deadline: March 2, 2015 (extended to March 9, 2015)
Author Notification: May 11, 2015
Proceedings Version: June 8, 2015
Conference: August 24-28, 2015
************
SUBMISSION
************
The proceedings of ARES (including workshops) have been published by
Conference Publishing Services (CPS) of IEEE. Authors of selected papers
that are accepted by and presented at the ARES Conference (including
workshops) will be invited to submit an extended version to special issues
of international journals.
Authors are invited to submit research and application papers according the
following guidelines: two columns, single-spaced, including figures and
references, using 10 pt fonts and number each page.
For the main conference as well as the workshops submission papers are
classified into 3 categorizes representing original, previously unpublished
work:
full paper (10 pages)
short paper (6 pages)
workshop paper (8 pages, a maximum of 10 pages is tolerated)
Submitted papers will be carefully evaluated based on originality,
significance, technical soundness, presentation and clarity of exposition.
Simultaneous submission of the same work to multiple venues, submission of
previously published work, or plagiarism constitutes dishonesty or fraud.
ARES, like other scientific and technical conferences and journals,
prohibits these practices and may take action against authors who have
committed them.
Double blind review: ARES requires anonymized submissions please make sure
that submitted papers contain no author names or obvious self-references.
************
PROGRAM COMMITTEE
************
Jon A. Solworth, University of Illinois at Chicago, US
Isaac Agudo, University of Malaga, Spain
Philipp Amann, European Cybercrime Centre, Netherlands
Amin Anjomshoaa, Massachusetts Institute of Technology (MIT), US
Aslan Askarov, Aarhus University, Denmark
Ravishankar Borgaonkar, Technische Universität Berlin, Germany
Stephane Bressan, National University of Singapore, Singapore
Luanne Burns Goldrich, The Johns Hopkins University Applied Physics
Laboratory, US
Mario Cagalj, University of Split, Croatia
Lasaro Camargos, Federal University of Uberlandia, Brazil
Jordi Castellà-Roca, Rovira i Virgili University of Tarragona, Spain
Lorenzo Cavallaro, Royal Holloway, University of London, UK
David Chadwick, University of Kent, UK
Soon Ae Chun, City University of New York, US
Nathan Clarke, University of Plymouth, UK
Marijke Coetzee, University of Johannesburg, South Africa
Vincenzo De Florio, PATS / Universiteit Antwerpen and PATS / iMinds, Belgium
Steven Demurjian, University of Connecticut, US
Mark Dillon, International Criminal Court, Netherlands
Adam Doupé, Arizona State University, US
Pavlos Efraimidis, Democritus University of Thrace, Greece
Manuel Egele, Carnegie Mellon University, US
Christian Engelmann, Oak Ridge National Laboratory, US
Aristide Fattori, Università degli Studi di Milano, Italy
Hannes Federrath, University of Hamburg, Germany
Christophe Feltus, Luxembourg Institute of Science and Technology (LIST),
Luxembourg
Simone Fischer-Huebner, Karlstad University, Sweden
Francesco Flammini, Ansaldo STS, Italy
Steven Furnell, Plymouth University, UK
Karl Goeschka, Vienna University of Technology, Austria
Nico Golde, Qualcomm Research Germany
Marcin Gorawski, Wroclaw University of Technology and Silesian University of
Technology, Poland
Bogdan Groza, Politehnica University of Timisoara, Romania
Marit Hansen, Independent Centre for Privacy Protection, Kiel
Connie Heitmeyer, Naval Research Laboratory, USA
Dominik Herrmann, University Hamburg, Germany
Martin Gilje Jaatun, SINTEF, Norway
Hai Jin, Huazhong University of Science and Technology, China
Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany
Sokratis K. Katsikas, University of Piraeus, Greece
Vasilis Katos, University of Thrace, Greece
Peter Kieseberg, SBA Research, Austria
Ezzat Kirmani, St. Cloud State University, US
Thomas Korak, Graz University of Technology, Austria
Thorsten Kramp, IBM Research Zurich, Switzerland
Ralf Kuesters, University of Trier, Germany
Costas Lambrinoudakis, University of Piraeus, Greece
Corrado Leita, Symantec Research Labs, France
Shujun Li, University of Surrey, UK
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Konstantinos Markantonakis, Royal Holloway and Bedford New College, UK
Keith Martin, Royal Holloway, University of London, UK
Ioannis Mavridis, University of Macedonia, Greece
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Todd McDonald, University of South Alabama, US
Katerina Mitrokotsa, Chalmers University of Technology, Sweden
Mattia Monga, Universita` degli Studi di Milano, Italy
Haris Mouratidis, University of Brighton, UK
Thomas Moyer, MIT Lincoln Laboratory
Alexios Mylonas, Staffordshire University, UK
Thomas Nowey, Krones AG, Germany
Christoforos Ntantogian, University of Piraeus, Greece
Rolf Oppliger, eSecurity Technologies, Switzerland
Jaehong Park, University of Texas at San Antonio
Günther Pernul, University of Regensburg, Germany
Andreas Peter, University of Twente, Netherlands
Todd R. Andel, University of South Alabama, US
Stefanie Rinderle-Ma, University of Vienna, Austria
Domenico Rosaci, University Mediterranea of Reggio Calabria, Italy
Volker Roth, Freie Universitaet Berlin, Germany
Giovanni Russello, University of Auckland, New Zealand
Luis Enrique Sánchez Crespo, University of Armed Forced, University of
Castilla-la Mancha, Spain
Mark Scanlon, University College Dublin, Ireland
Sebastian Schinzel, Münster University of Applied Sciences, Germany
Jörn-Marc Schmidt, secunet, Germany
Max Schuchard, University of Minnesota, US
Stefan Schulte, Vienna University of Technology, Austria
Dimitris Simos, SBA Research, Austria
Mark Strembeck, Vienna University of Economics and Business, Austria
Gianluca Stringhini, Univerity College London, UK
Thorsten Strufe, TU Dresden, Germany
Jakub Szefer, Yale School of Engineering & Applied Science, US
Laurence T. Yang, St Francis Xavier University, Canada
Tsuyoshi Takagi, Kyushu University, Japan
Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany
Umberto Villano, Universita del Sannio, Italy
Cong Wang, City University of Hong Kong, Hong Kong
Lenx Wei, Peking University, China
Jinpeng Wei, Florida International University, US
Erich Wenger, IAIK TU Graz, Austria
Christos Xenakis, University of Piraeus, Greece
Fabian Yamaguchi, University of Göttingen, Germany
Alec Yasinsac, University of South Alabama, US
Nicola Zannone, Eindhoven University of Technology, The Netherlands
************
TOPCIS of interest include, but are not limited to:
************
Authorization and Authentication
Availability and Reliability
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
Dependability Aspects of Electronic Government (e-Government)
Dependability Administration
Dependability in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Failure Prevention
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding
Internet Dependability
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security Privacy-Enhancing Technologies
Process based Security Models and Methods
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security Issues for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and
Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Standards, Guidelines and Certification
Survivability of Computing Systems
Temporal Aspects of Dependability
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
VOIP, Wireless Security
Best regards,
Edgar Weippl.
PS: Conferences organized by SBA Research:
ACM SACMAT 2015 June 1-3, 2015, Vienna, Austria, <http://www.sacmat.org/>
http://www.sacmat.org/
ESORICS 2015 September 21-25, 2015 (Submission Deadline: April 4, 2015)
Vienna, Austria, <http://esorics2015.sba-research.org/>
http://esorics2015.sba-research.org/
CCS 2016 October 24-28, 2016, Vienna, Austria
Edgar R. Weippl <mailto:eweippl@sba-research.org>
eweippl(a)sba-research.org
Research Director T: +43 1 5053688
<http://www.sba-research.org/> http://www.sba-research.org/ F: +43 1
5047881
<http://www.ares-conference.eu/> http://www.ares-conference.eu
Follow us on Twitter ( <http://twitter.com/#%21/ARES_Conference/>
http://twitter.com/#!/ARES_Conference/)
Find us on Facebook ( <https://www.facebook.com/AresConference>
https://www.facebook.com/AresConference)
1
0
ARES 2015 - CALL FOR PAPERS
****************************************************************************
**************
The Tenth International Conference on Availability, Reliability and Security
(ARES 2015)
August 24th 28th, 2015, Toulouse, France
http://www.ares-conference.eu
Sumission Deadline: extended to March 9, 2015
****************************************************************************
**************
***********
ARES CONFERENCE
************
The 10th International Conference on Availability, Reliability and Security
(ARES) will bring together researchers and practitioners in the area of
dependability. ARES will highlight the various aspects of security - with
special focus on the crucial linkage between availability, reliability and
security.
ARES aims at a full and detailed discussion of the research issues of
security as an integrative concept that covers amongst others availability,
safety, confidentiality, integrity, maintainability and security in the
different fields of applications.
ARES will emphasize the interplay between foundations and practical issues
of security in emerging areas such as e-government, m-government,
location-based applications, ubiquitous computing, autonomous computing,
chances of grid computing etc. ARES is devoted to the critical examination
and research challenges of the various aspects of Secure and Dependable
Computing and the definition of a future road map.
Selected papers that are accepted by and presented at the ARES Conference
will be published, after further revision, in special issues of
international journals. The acceptance rate of the ARES 2014 conference was
16%. The ARES conferences have been published by IEEE CPS.
************
CONFERENCE OFFICERS
************
General Chair
Abdelmalek Benzekri, Université Paul Sabatier, France
Program Committee Chair
Stefan Katzenbeisser, TU Darmstadt, Germany
************
KEYNOTE SPEAKERS
************
Peter Eckersley, EFF, US
Rainer Böhme, University of Münster, Germany
Pierangela Samarati, Università degli Studi di Milano, Italy
(tutorials will be announced soon)
************
IMPORTANT DATES
************
Submission Deadline: March 2, 2015 (extended to March 9, 2015)
Author Notification: May 11, 2015
Proceedings Version: June 8, 2015
Conference: August 24-28, 2015
************
SUBMISSION
************
The proceedings of ARES (including workshops) have been published by
Conference Publishing Services (CPS) of IEEE. Authors of selected papers
that are accepted by and presented at the ARES Conference (including
workshops) will be invited to submit an extended version to special issues
of international journals.
Authors are invited to submit research and application papers according the
following guidelines: two columns, single-spaced, including figures and
references, using 10 pt fonts and number each page.
For the main conference as well as the workshops submission papers are
classified into 3 categorizes representing original, previously unpublished
work:
full paper (10 pages)
short paper (6 pages)
workshop paper (8 pages, a maximum of 10 pages is tolerated)
Submitted papers will be carefully evaluated based on originality,
significance, technical soundness, presentation and clarity of exposition.
Simultaneous submission of the same work to multiple venues, submission of
previously published work, or plagiarism constitutes dishonesty or fraud.
ARES, like other scientific and technical conferences and journals,
prohibits these practices and may take action against authors who have
committed them.
Double blind review: ARES requires anonymized submissions please make sure
that submitted papers contain no author names or obvious self-references.
************
PROGRAM COMMITTEE
************
Jon A. Solworth, University of Illinois at Chicago, US
Isaac Agudo, University of Malaga, Spain
Philipp Amann, European Cybercrime Centre, Netherlands
Amin Anjomshoaa, Massachusetts Institute of Technology (MIT), US
Aslan Askarov, Aarhus University, Denmark
Ravishankar Borgaonkar, Technische Universität Berlin, Germany
Stephane Bressan, National University of Singapore, Singapore
Luanne Burns Goldrich, The Johns Hopkins University Applied Physics
Laboratory, US
Mario Cagalj, University of Split, Croatia
Lasaro Camargos, Federal University of Uberlandia, Brazil
Jordi Castellà-Roca, Rovira i Virgili University of Tarragona, Spain
Lorenzo Cavallaro, Royal Holloway, University of London, UK
David Chadwick, University of Kent, UK
Soon Ae Chun, City University of New York, US
Nathan Clarke, University of Plymouth, UK
Marijke Coetzee, University of Johannesburg, South Africa
Vincenzo De Florio, PATS / Universiteit Antwerpen and PATS / iMinds, Belgium
Steven Demurjian, University of Connecticut, US
Mark Dillon, International Criminal Court, Netherlands
Adam Doupé, Arizona State University, US
Pavlos Efraimidis, Democritus University of Thrace, Greece
Manuel Egele, Carnegie Mellon University, US
Christian Engelmann, Oak Ridge National Laboratory, US
Aristide Fattori, Università degli Studi di Milano, Italy
Hannes Federrath, University of Hamburg, Germany
Christophe Feltus, Luxembourg Institute of Science and Technology (LIST),
Luxembourg
Simone Fischer-Huebner, Karlstad University, Sweden
Francesco Flammini, Ansaldo STS, Italy
Steven Furnell, Plymouth University, UK
Karl Goeschka, Vienna University of Technology, Austria
Nico Golde, Qualcomm Research Germany
Marcin Gorawski, Wroclaw University of Technology and Silesian University of
Technology, Poland
Bogdan Groza, Politehnica University of Timisoara, Romania
Marit Hansen, Independent Centre for Privacy Protection, Kiel
Connie Heitmeyer, Naval Research Laboratory, USA
Dominik Herrmann, University Hamburg, Germany
Martin Gilje Jaatun, SINTEF, Norway
Hai Jin, Huazhong University of Science and Technology, China
Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany
Sokratis K. Katsikas, University of Piraeus, Greece
Vasilis Katos, University of Thrace, Greece
Peter Kieseberg, SBA Research, Austria
Ezzat Kirmani, St. Cloud State University, US
Thomas Korak, Graz University of Technology, Austria
Thorsten Kramp, IBM Research Zurich, Switzerland
Ralf Kuesters, University of Trier, Germany
Costas Lambrinoudakis, University of Piraeus, Greece
Corrado Leita, Symantec Research Labs, France
Shujun Li, University of Surrey, UK
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Konstantinos Markantonakis, Royal Holloway and Bedford New College, UK
Keith Martin, Royal Holloway, University of London, UK
Ioannis Mavridis, University of Macedonia, Greece
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Todd McDonald, University of South Alabama, US
Katerina Mitrokotsa, Chalmers University of Technology, Sweden
Mattia Monga, Universita` degli Studi di Milano, Italy
Haris Mouratidis, University of Brighton, UK
Thomas Moyer, MIT Lincoln Laboratory
Alexios Mylonas, Staffordshire University, UK
Thomas Nowey, Krones AG, Germany
Christoforos Ntantogian, University of Piraeus, Greece
Rolf Oppliger, eSecurity Technologies, Switzerland
Jaehong Park, University of Texas at San Antonio
Günther Pernul, University of Regensburg, Germany
Andreas Peter, University of Twente, Netherlands
Todd R. Andel, University of South Alabama, US
Stefanie Rinderle-Ma, University of Vienna, Austria
Domenico Rosaci, University Mediterranea of Reggio Calabria, Italy
Volker Roth, Freie Universitaet Berlin, Germany
Giovanni Russello, University of Auckland, New Zealand
Luis Enrique Sánchez Crespo, University of Armed Forced, University of
Castilla-la Mancha, Spain
Mark Scanlon, University College Dublin, Ireland
Sebastian Schinzel, Münster University of Applied Sciences, Germany
Jörn-Marc Schmidt, secunet, Germany
Max Schuchard, University of Minnesota, US
Stefan Schulte, Vienna University of Technology, Austria
Dimitris Simos, SBA Research, Austria
Mark Strembeck, Vienna University of Economics and Business, Austria
Gianluca Stringhini, Univerity College London, UK
Thorsten Strufe, TU Dresden, Germany
Jakub Szefer, Yale School of Engineering & Applied Science, US
Laurence T. Yang, St Francis Xavier University, Canada
Tsuyoshi Takagi, Kyushu University, Japan
Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany
Umberto Villano, Universita del Sannio, Italy
Cong Wang, City University of Hong Kong, Hong Kong
Lenx Wei, Peking University, China
Jinpeng Wei, Florida International University, US
Erich Wenger, IAIK TU Graz, Austria
Christos Xenakis, University of Piraeus, Greece
Fabian Yamaguchi, University of Göttingen, Germany
Alec Yasinsac, University of South Alabama, US
Nicola Zannone, Eindhoven University of Technology, The Netherlands
************
TOPCIS of interest include, but are not limited to:
************
Authorization and Authentication
Availability and Reliability
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
Dependability Aspects of Electronic Government (e-Government)
Dependability Administration
Dependability in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Failure Prevention
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding
Internet Dependability
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security Privacy-Enhancing Technologies
Process based Security Models and Methods
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security Issues for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and
Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Standards, Guidelines and Certification
Survivability of Computing Systems
Temporal Aspects of Dependability
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
VOIP, Wireless Security
1
0