<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
<HEAD>
<META http-equiv=Content-Type content="text/html; charset="></HEAD>
<BODY style="FONT-FAMILY: Tahoma">
<P>Apologies for multiple copies due to cross postings. Please send to
interested colleagues and students.</P>
<P>
Call for
Papers<BR>+-------------------------------------------------------------------+<BR>|
The Second International Conference on Availability, Reliability and Security
(AReS)<BR>| ARES 2007 - "The International Security and Dependability
Conference"</P>
<P>
April 10th – April
13th,2007
<BR>
Vienna University of Technology, Austria</P>
<P>
<A title=http://www.ares-conf.org
href="http://www.ares-conf.org">http://www.ares-conf.org</A><BR>
<A title=http://www.ares-conference.eu
href="http://www.ares-conference.eu">http://www.ares-conference.eu</A><BR>+-------------------------------------------------------------------+</P>
<P><BR>Conference<BR>-----------<BR>The 1st International Conference on
Availability, Reliability and Security conference (ARES 2006) <BR>has been
successfully organized in Vienna, AUSTRIA from April 20 to April 22, 2006 by the
Technical <BR>University of Vienna in cooperation with the European Network and
Security Agency (ENISA). We have <BR>attracted 250 participants for this
conference with its 3 keynotes speakers and its 9 workshops held <BR>in
conjunction with.</P>
<P>In continuation of the successful 1st ARES conference, The Second
International Conference on Availability, <BR>Reliability and Security (“ARES
2007 – The International Security and Dependability Conference”) <BR>will bring
together researchers and practitioners in the area of IT-Security and
Dependability.</P>
<P>ARES 2007 will highlight the various aspects of security – with special focus
on secure internet solutions, <BR>trusted computing, digital forensics, privacy
and organizational security issues.</P>
<P>ARES 2007 aims at a full and detailed discussion of the research issues of
security as an integrative <BR>concept that covers amongst others availability,
safety, confidentiality, integrity, maintainability <BR>and security in the
different fields of applications.</P>
<P>Important Dates<BR>----------------<BR>* Workshop Proposal:
September, 10th 2006 <BR>* Submission Deadline: November, 19th 2006
<BR>* Author Notification: January, 7th 2007 <BR>* Author
Registration: January, 21st 2007 <BR>* Proceedings Version: January, 21st
2007 </P>
<P>Workshop Proposal<BR>-----------------<BR>In conjunction with the AReS2007
conference, a number of workshops will be organised.<BR>Workshop proposals which
should include the call for papers, the number of papers to be accepted, <BR>the
contact person, etc. are to be sent to the Workshop Organizing Committee (<A title=mailto:tho@ifs.tuwien.ac.at href="mailto:tho@ifs.tuwien.ac.at">tho@ifs.tuwien.ac.at</A>), <BR>by
September 10th 2006. Proceedings of the ARES 2007 workshops will be published by
IEEE Computer <BR>Society Press.</P>
<P>Topics of interest include, but are not limited
to:<BR>----------------------------------------------------<BR>* Process based
Security Models and Methods<BR>* Autonomous Computing <BR>* Authorization and
Authentication <BR>* Availability and Reliability<BR>* Common Criteria
Protocol<BR>* Cost/Benefit Analysis <BR>* Cryptographic protocols <BR>*
Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics)
<BR>* Dependability Aspects of Electronic Government (e-Government) <BR>*
Dependability administration<BR>* Dependability in Open Source Software <BR>*
Designing Business Models with security requirements<BR>* Digital Forensics<BR>*
E-Commerce Dependability<BR>* Failure Prevention<BR>* IPR of Security
Technology<BR>* Incident Response and Prevention <BR>* Information Flow Control
<BR>* Internet Dependability<BR>* Interoperability aspects <BR>* Intrusion
Detection and Fraud Detection<BR>* Legal issues <BR>* Mobile Security <BR>*
Network Security<BR>* Privacy-enhancing technologies <BR>* RFID Security and
Privacy<BR>* Risk planning, analysis & awareness <BR>* Safety Critical
Systems<BR>* Secure Enterprise Architectures <BR>* Security Issues for
Ubiquitous Systems<BR>* Security and Privacy in E-Health<BR>* Security and Trust
Management in P2P and Grid applications<BR>* Security and privacy issues for
sensor networks, wireless/mobile devices and applications<BR>* Security as
Quality of Service<BR>* Security in Distributed Systems / Distributed Databases
<BR>* Security in Electronic Payments <BR>* Security in Electronic Voting<BR>*
Software Engineering of Dependable Systems<BR>* Software Security <BR>*
Standards, Guidelines and Certification <BR>* Survivability of Computing
Systems<BR>* Temporal Aspects of Dependability<BR>* Trusted Computing<BR>* Tools
for Dependable System Design and Evaluation<BR>* Trust Models and Trust
Management<BR>* VOIP/Wireless Security </P>
<P>Submission Guidelines<BR>----------------------<BR>Authors are invited to
submit research and application papers following the IEEE Computer Society
Proceedings <BR>Manuscripts style: two columns, single-spaced, including figures
and references, using 10 fonts, and number <BR>each page. You can confirm the
IEEE Computer Society Proceedings Author Guidelines at the following web
page:<BR>URL: <A title=http://computer.org/cspress/instruct.htm
href="http://computer.org/cspress/instruct.htm">http://computer.org/cspress/instruct.htm</A></P>
<P>The Web site for paper registration and electronic submission is available
at:<BR><A title=http://www.ares-conf.org/confdriver/?q=confdriver/papers/add
href="http://www.ares-conf.org/confdriver/?q=confdriver/papers/add">http://www.ares-conf.org/confdriver/?q=confdriver/papers/add</A></P>
<P>Please refer to ARES website (<A title=http://www.ares-conf.org
href="http://www.ares-conf.org">http://www.ares-conf.org</A> or <A
title=http://www.ares-conference.eu
href="http://www.ares-conference.eu">http://www.ares-conference.eu</A>) for
update information.</P>
<P>Honorary Co-Chairs<BR>-------------------<BR>Norman Revell, Middlesex
University, United Kingdom<BR>Roland Wagner, University of Linz, Austria</P>
<P>General Co-Chairs<BR>------------------<BR>Guenther Pernul, University of
Regensburg, Germany<BR>Makoto Takizawa, Tokyo Denki University, Japan</P>
<P>Program Co-Chairs<BR>------------------<BR>Gerald Quirchmayr, University of
Southern Australia, Australia<BR>A Min Tjoa, Vienna University of Technology,
Austria</P>
<P><BR>Workshops Co-Chairs<BR>--------------------<BR>Nguyen Manh Tho, Vienna
University of Technology, Austria<BR>Abdelkader Hameurlain, University of
Toulouse, France<BR>Leonard Barolli, Fukuoka Institute of Technology (FIT),
Japan</P>
<P><BR>International Liaison
Co-Chairs<BR>--------------------------------<BR>Maria Wimmer, University of
Koblenz-Landau, Germany<BR>Charles Shoniregun, University of East London, United
Kingdom</P>
<P><BR>Publicity Chair<BR>----------------<BR>Vladimir Marik, Czech Technical
University, Czech Republic</P>
<P><BR>Publication Chair<BR>------------------<BR>Monika Lanzenberger, Norwegian
University of Science and Technology, Trondheim, Norway</P>
<P><BR>Local Organizing Chairs<BR>------------------------<BR>Maria Schweikert,
Vienna University of Technology, Austria<BR>Markus Klemen, Vienna University of
Technology, Austria</P>
<P>Programme Committee<BR>--------------------<BR>Jemal H. Abawajy, Deakin
University, Australia<BR>Karl Aberer, EPFL, Switzerland<BR>Abiola Abimbola,
Napier University, UK<BR>Rafael Accorsi, University of Freiburg,
Germany<BR>Alessandro Acquisti, Carnegie Mellon University, USA<BR>Andre
Adelsbach, Telindus PSF S.A., Luxembourg<BR>Vasilis Aggelis, PIRAEUS Bank
(WINBANK), Greece<BR>John Andrews, Loughborough, University, UK<BR>Michael
Backes, Saarland University, Germany<BR>Leonard Barolli, Fukuoka Institute of
Technology (FIT), Japan<BR>Lisa Bartlett, Loughborough University, UK<BR>Massimo
Bartoletti, Universita' di Pisa, Italy<BR>Darcy G. Benoit, Acadia University,
Wolfville, Canada<BR>Helmut Berger, E-Commerce Competence Center - EC3,
Austria<BR>Bharat Bhargava, Purdue University, USA<BR>Christophe Blanchet, CNRS
IBCP, France<BR>Alexander Böhm, University of Mannheim, Germany<BR>Stephane
Bressan, National University of Singapore, Singapore<BR>Luciano Burgazzi, ENEA,
Italy<BR>Kevin Butler, Pennsylvania State University, USA<BR>Jesper Buus Nielsen
, University of Aarhus, Denmark<BR>Catharina Candolin, The Finnish Defence
Forces. Finland<BR>Jiannong Cao, Hong Kong Polytechnic University,
Hongkong<BR>Jordi Castellà-Roca, Rovira i Virgili University of Tarragona,
Spain<BR>David Chadwick, University of Kent, UK<BR>Surendar Chandra, University
of Notre Dame, USA<BR>Guihai Chen, Nanjing University, China<BR>Simon
Christophe, Nancy University, France<BR>Soon-Ae Chun, City University of New
York, USA<BR>Nathan Clarke, University of Plymouth, UK<BR>Joey Coleman,
University of Newcastle upon Tyne, UK<BR>Gao Cong, University of Edinburgh,
UK<BR>Ricardo Corin, INRIA-MSR & University of Twente, The
Netherlands<BR>George Davida, University of Wisconsinat Milwaukee, USA<BR>Robert
H. Deng , Singapore Management University, Singapore<BR>Jochen Dinger,
Universität Karlsruhe (TH), Germany<BR>Lucia Draque Penso, University of
Mannheim, Germany<BR>Schahram Dustdar, Vienna University of Technology,
Austria<BR>Christian Engelmann, Oak Ridge National Laboratory, USA<BR>Yung-Chin
Fang, Dell Inc., USA<BR>Hannes Federrath, University of Regensburg,
Germany<BR>Pascal Felber, Université de Neuchâtel, Switzerland<BR>Elena Ferrari,
University of Insubria, Italy<BR>Sergio Flesca, DEIS – University of Calabria,
Italy<BR>Vincenzo De Florio, University of Antwerp, Belgium<BR>Vladimir
Fomichov, K.E. Tsiolkovsky Russian State Technological University,
Russia<BR>Jordi Forné, Technincal Universtiy of Catalonia,
Spain<BR>Huirong Fu, Oakland University, MI, USA <BR>Steven Furnell, University
of Plymouth, UK<BR>Javier Garcia-Villalba, Complutense University of Madrid,
Spain<BR>Matthew Gebski, University of New South Wales, Australia<BR>Karl
Goeschka, Vienna University of Technology, Austria<BR>Swapna S. Gokhale,
University of Connecticut, USA<BR>Marcin Gorawski, Silesian University of
Technology, Poland<BR>Stephan Groß, Technische Universität Dresde,
Germany<BR>Daniel Grosu, Wayne State University, USA<BR>Michael Grottke, Duke
University, USA<BR>Le Gruenwald, University of Oklahoma, USA<BR>Qijun Gu, Texas
State University, USA<BR>Yong Guan, Iowa State University, USA<BR>Ibrahim
Haddad, Open Source Development Labs, USA<BR>Abdelkader Hameurlain, Paul
Sabatier University, France<BR>Marit Hansen, Independent Centre for Privacy
Protection, USA<BR>Naohiro Hayashibara, Tokyo Denki University, Japan<BR>Xubin
(Ben) He, Tennessee Technological University, USA<BR>Yanxiang He, Wuhan
University, China<BR>Rattikorn Hewett, Texas Tech University, USA<BR>Chin-Tser
Huang, University of South Carolina, USA<BR>Jimmy Huang, York University,
Canada<BR>Thomas Jensen, IRISA/CNRS, France<BR>Zhen Jiang, West Chester
University, USA<BR>Hai Jin, Huazhong University of Science and Technology,
China<BR>Oliver Jorns, ftw. Forschungszentrum Telekommunikation Wien,
Austria<BR>Audun Josang, School of Software Engineering and Data Communications,
Australia<BR>Jan Jurjens, Munich University of Technology, Germany and Open
University, UK<BR>Holger Kenn, University of Bremen, Germany<BR>Dogan Kesdogan,
RWTH Aachen, Germany<BR>Brian King, Indiana University Purdue University
Indianapolis, USA<BR>Ted Krovetz, California State University, USA<BR>Raphael
Kunis, Chemnitz University of Technology, Germany<BR>Helmut Kurth, Atsec
Information Security, USA<BR>Marc Lacoste, France Télécom R&D,
France<BR>Kwok-Yan Lam, Tsinghua University, China<BR>Chokchai Box Leangsuksun,
Louisiana Tech University, USA<BR>Yih-Jiun Lee, Department of Information
Management, CTU, Taiwan<BR>Chin-Laung Lei, National Taiwan University,
China<BR>Philippe Leray, INSA (National Institute of Applied Sciences) of Rouen,
France<BR>Jun Li, University of Oregon, USA<BR>Sam Lightstone, IBM Canada Ltd.,
Canada<BR>Chae-Hoon Lim, Sejong University, Korea<BR>Ching Lin, Macquarie
University, Australia<BR>Man Lin, St. Francis Xavier University, Canada<BR>Alex
Zhaoyu Liu, University of North Carolina at Charlotte, USA<BR>Tong Liu, Dell
Inc, USA<BR>Hua Liu , Xerox labs, USA<BR>Javier Lopez, University of Malaga,
Spain<BR>Sanglu Lu, Nanjing University, China<BR>Jianhua Ma, Hosei University,
Japan<BR>Qiang Ma, NEC, Japan<BR>Josef Makolm, Federal Ministry of Finance,
Austria<BR>Carsten Maple, University of Luton, UK<BR>Keith Martin , University
of London, UK<BR>Fabio Martinelli, National Research Council - C.N.R,
Italy<BR>BeniaminoDi Martino, Second University of Naples, Italy<BR>Santiago
Melia, University of Alicante, Spain<BR>Nasrullah Memon, Aalborg University
Esbjerg, Denmark<BR>Geyong Min, University of Bradford, UK<BR>George Mohay,
Queensland University of Technology, Australia<BR>Marina Mongiello, Technical
University of Bari, Italy<BR>Stefania Montani, Universita' del Piemonte
Orientale, Italy<BR>Yi Mu, University of Wollongong, Australia<BR>Junghyun Nam,
Sungkyunkwan University, Korea<BR>Priya Narasimhan, Carnegie Mellon University,
USA<BR>Tho Manh Nguyen, Vienna University of Technology, Austria<BR>Jesper
Nielsen, University of Århus, Denmark<BR>Thomas Nowey, University of Regensburg,
Germany<BR>Tomas Olovsson, Chalmers University of Technology, Sweden<BR>Hong
Ong, Oak Ridge National Laboratory, USA<BR>Maria Papadaki, University of
Plymouth, UK<BR>Manish Parashar, Rutgers University, USA <BR>Fernando Pedone,
University of Lugano, Switzerland<BR>MariaS. Perez, UPM, Spain<BR>Günther
Pernul, University of Regensburg, Germany<BR>Rob Peters, University of
Amsterdam, The Neitherland<BR>Thomas Phan, IBM Research, USA<BR>Mario Piattini,
University of Castilla-La Mancha, Spain<BR>Makan Pourzandi, Ericsson Canada,
Canada<BR>Christopher Price, University of Wales Aberystwyth, UK<BR>Jean-Jacques
Quisquater, Universite catholique de Louvain, Belgium<BR>Wenny Rahayu, La Trobe
University, Australia<BR>Indrajit Ray, Colorado State University,
USA<BR>Domenico Rosaci, University "Mediterranea" of Reggio Calabria,
Italy<BR>Heiko Rossnagel, Johann Wolfgang Goethe University Frankfurt,
Germany<BR>Bimal Roy, Indian Statistical Institute, India<BR>Kenji Saito, Keio
University, Japan<BR>Kouichi Sakurai, Kyushu University, Japan<BR>BiplabK.
Sarker , University of New Brunswick, Fredericton, Canada<BR>Ingrid
Schaumüller-Bichl, FH OÖ Campus Hagenberg, Austria<BR>Stephen L. Scott, Oak
Ridge National Laboratory - USA<BR>Dharmaraja Selamuthu, Indian Institute of
Technology Delhi, India<BR>Tony Shan, Wachovia Bank, USA<BR>Thomas Shrimpton,
Portland State University, USA<BR>Richard Sinnott, University of Glasgow,
UK<BR>Amund Skavhaug, Norwegian University of Science and Technology,
Norway<BR>Agusti Solanas, Rovira i Virgili University, Spain<BR>Alexander
Speirs, University of Newcastle upon Tyne, UK<BR>Katarina Stanoevska-Slabeva,
University St. Gallen, Switzerland<BR>Ketil Stølen, SINTEF & University of
Oslo, Norway<BR>Aaron Striegel, University of Notre Dame, USA<BR>Peter Struss,
Munich University of Technology, Germany<BR>Tsuyoshi Takagi, Future University -
Hakodate, Japan<BR>Makoto Takizawa, Tokyo Denki University, Japan<BR>Oliver
Theel, University of Oldenburg, Germany<BR>Björn Thuresson, KTH Computer Science
and Communication, Sweden<BR>A Min Tjoa, Vienna University of Technology,
Austria<BR>Kishor Trivedi, Duke University, USA<BR>Juan Trujillo, University of
Alicante, Spain<BR>Alexander W. Tsow, Indiana University, USA<BR>Tomas Uribe,
SRI International, USA<BR>Kalyan Vaidyanathan, Sun Microsystems, USA<BR>Luca
Vigano, ETH Zurich, Switzerland<BR>Umberto Villano, Universita' del Sannio,
Italy<BR>Melanie Volkamer, DFKI - German Research Center for Artificial
Intelligence, Germany<BR>Michael Waidner, IBM Software Group,
Switzerland<BR>Carine Webber, Universidade de Caxias do Sul, Brazil<BR>Edgar
Weippl, Vienna University of Technology, Austria<BR>Robert Willison, Copenhagen
Business School, Denmark<BR>Maria Wimmer, University of Koblenz-Landau,
Germany<BR>Matthew Wright, University of Texas at Arlington, USA<BR>Qinghan Xiao
, Defence R&D Canada, Canada<BR>Liudong Xing, University of Massachusetts,
USA<BR>Cheng-Zhong Xu, Wayne State University, USA<BR>Mariemma.I. Yagüe,
University of Malaga, Spain<BR>Jeff Yan, Newcastle University, UK<BR>Laurence
Yang, St. Francis Xavier University, Canada<BR>Alec Yasinsac, Florida State
University, USA<BR>George Yee, National Research Council, Canada<BR>Sung-Ming
Yen, National Central University, Taiwan<BR>Xun Yi, Victoria University,
USA<BR>Meng Yu, Monmouth University, USA<BR>William Yurcik, University of
Illinois, USA<BR>Nicola Zannone, University of Trento, Italy<BR>Jianhong Zhang,
North China University of Technology, China<BR>Liqiang Zhang, Indiana University
South Bend, USA<BR>Jianying Zhou, Institute for Infocomm Research,
Singapore<BR>Xudong Zhu, Alcatel shangHai Bell Co. LTD., China<BR>Enrico Zio,
Polytechnic of Milan, Italy</P>
</BODY>
</HTML>