Focus of the Conference
Topics of interest include, but are not limited to:
-
Secure Enterprise Architectures
-
(Process based) Security Models / Methods
-
Risk planning, analysis & awareness
-
Availability and Reliability
-
Reliability Models
-
Failure Prevention
-
Dependability Assessment
-
Standards, Guidelines and Certification
-
Common Criteria Protocol
-
Security in Distributed Systems / Distributed Databases
-
Dependability in Open Source Software
-
Authorization and Authentication
-
Dependability Requirement Engineering
-
Network Security
-
Software Security
-
Cryptographic protocols
-
Intrusion Detection and Fraud Detection
-
Privacy-enhancing technologies
-
Security and privacy issues for sensor networks, wireless/mobile devices and applications
-
Security and Trust Management in P2P and Grid applications
-
Survivability of Computing Systems
-
Interoperability aspectsSecurity as Quality of Service.
-
Information Flow Control
-
Dependability Modelling and Prediction
-
Tools for Dependable System Design and Evaluation
-
Temporal Aspects of Dependability
|
-
Dependability administration
-
Dependability Measurement and Analysis
-
Dependability Benchmarking
-
Trust Models and Trust Management
-
Fault/Bug Tolerant Aspects
-
Internet Dependability
-
E-Commerce Dependability
-
Safety Critical Systems
-
Software Engineering of Dependable Systems
-
Dependability Aspects of Mobile Government (m-Government)
-
Dependability Aspects of Electronic Government (e-Government)
-
Effectivity of Biometrics
-
Security in Electronic Voting
-
Security Issues for Ubiquitous Systems
-
Availability of Pervasive Computing Systems
-
Dependability Aspects for Special Applications (e.g ERP-Systems, Logistics)
-
Designing Business Models with security requirements
-
Security for Biometrics Applications
-
Security in Electronic Payments
-
Incident Response and Prevention
-
Mobile Resources/Services
-
Mobile Security
-
VOIP/Wireless Security
-
Web Security
-
RFID Security and Privacy
-
User Interfaces and Dependability
-
Legal issues
-
IPR of Security Technology
|
|