Resource Management Architectures -- QoS for Multimedia Services in Wireless Networks -- Cross-Layer Architectures for Bandwidth Management in Wireless Networks -- Resource Management and Connection Admission Control in Wireless Networks -- Channel Allocation and Scheduling -- Real-Time Guarantees in Wireless Networks -- Fair Real-Time Scheduling over a Wireless LAN -- Inter-Domain Radio Resour…
Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical…
CMMI RAMS Extension Based on CENELEC Railway Standard -- The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems -- Combining Extended UML Models and Formal Methods to Analyze Real-Time Systems -- Defining and Decomposing Safety Policy for Systems of Systems -- Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment -- Control and Dat…
Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Compu…
The Problem of Computer Insecurity -- The Need to Raise Awareness -- Common Failings That Compromise Security -- The Widespread Nature of Vulnerability -- Attack and Exploitation of Systems -- External Influences and Dependencies -- Insecurity: Here Today, Here Tomorrow?.Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recen…
On Regular and Logarithmic Solutions of Ordinary Linear Differential Systems -- Computing the Betti Numbers of Arrangements in Practice -- A MAPLE Symbolic-Numeric Program for Solving the 2D-Eigenvalue Problem by a Self-consistent Basis Method -- RelView – An OBDD-Based Computer Algebra System for Relations -- On the Use of Gröbner Bases for Computing the Structure of Finite Abelian Groups -…
FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion De…
Keynote Speech and Invited Talks -- Theoretic Foundations -- Association Rules -- Biomedical Domains -- Classification and Ranking -- Clustering -- Dynamic Data Mining -- Graphic Model Discovery -- High Dimensional Data -- Integration of Data Warehousing -- Knowledge Management -- Machine Learning Methods -- Novel Algorithms -- Spatial Data -- Temporal Data -- Text and Web Data Mining.The Pacif…
Probabilistic Latent Clustering of Device Usage -- Condensed Nearest Neighbor Data Domain Description -- Balancing Strategies and Class Overlapping -- Modeling Conditional Distributions of Continuous Variables in Bayesian Networks -- Kernel K-Means for Categorical Data -- Using Genetic Algorithms to Improve Accuracy of Economical Indexes Prediction -- A Distance-Based Method for Preference Info…
Peer-2-Peer Systems -- Web Services -- Grid Computing -- Jini -- Gnutella -- Scalability -- Security -- Freenet -- Jxta -- Distributed Object Deployment Using Jini -- P2P Deployment Using Jxta -- Web Services Deployment -- OGSA.