Focus of the Conference

 

Topics of interest include, but are not limited to:

  • Secure Enterprise Architectures
  • (Process based) Security Models / Methods
  • Risk planning, analysis & awareness
  • Availability and Reliability
  • Reliability Models
  • Failure Prevention
  • Dependability Assessment
  • Standards, Guidelines and Certification
  • Common Criteria Protocol
  • Security in Distributed Systems / Distributed Databases
  • Dependability in Open Source Software
  • Authorization and Authentication
  • Dependability Requirement Engineering
  • Network Security
  • Software Security
  • Cryptographic protocols
  • Intrusion Detection and Fraud Detection
  • Privacy-enhancing technologies
  • Security and privacy issues for sensor networks, wireless/mobile devices and applications
  • Security and Trust Management in P2P and Grid applications
  • Survivability of Computing Systems
  • Interoperability aspectsSecurity as Quality of Service.
  • Information Flow Control
  • Dependability Modelling and Prediction
  • Tools for Dependable System Design and Evaluation
  • Temporal Aspects of Dependability
  • Dependability administration
  • Dependability Measurement and Analysis
  • Dependability Benchmarking
  • Trust Models and Trust Management
  • Fault/Bug Tolerant Aspects
  • Internet Dependability
  • E-Commerce Dependability
  • Safety Critical Systems
  • Software Engineering of Dependable Systems
  • Dependability Aspects of Mobile Government (m-Government)
  • Dependability Aspects of Electronic Government (e-Government)
  • Effectivity of Biometrics
  • Security in Electronic Voting
  • Security Issues for Ubiquitous Systems
  • Availability of Pervasive Computing Systems
  • Dependability Aspects for Special Applications (e.g ERP-Systems, Logistics)
  • Designing Business Models with security requirements
  • Security for Biometrics Applications
  • Security in Electronic Payments
  • Incident Response and Prevention
  • Mobile Resources/Services
  • Mobile Security
  • VOIP/Wireless Security
  • Web Security
  • RFID Security and Privacy
  • User Interfaces and Dependability
  • Legal issues
  • IPR of Security Technology