New Research Challenges for the Security of Ad Hoc and Sensor Networks -- Public Key Cryptography in Sensor Networks—Revisited -- Exploring Message Authentication in Sensor Networks -- Secure Initialization in Single-Hop Radio Networks -- Some Methods for Privacy in RFID Communication -- Ring Signature Schemes for General Ad-Hoc Access Structures -- Linking Ad Hoc Charging Schemes to AAAC Arc…
Efficient Verifiable Ring Encryption for Ad Hoc Groups -- SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations -- Remote Software-Based Attestation for Wireless Sensors -- Spontaneous Cooperation in Multi-domain Sensor Networks -- Authenticated Queries in Sensor Networks -- Improving Sensor Network Security with Information Quality -- One-Time Sensors: A Novel …
Prologue -- Walk-through: Using UML for Security -- Background -- Developing Secure Systems -- Model-based Security Engineering with UML -- Applications -- Tool Support -- Tool support for UMLsec -- A Formal Foundation -- Formal Systems Development with UML -- Epilogue -- Further Material -- Outlook.Attacks against computer systems can cause considerable economic or physical damage. High-qualit…
Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontol…
Language Issues -- ULF-Ware – An Open Framework for Integrated Tools for ITU-T Languages -- An Access Control Language for Dynamic Systems – Model-Driven Development and Verification -- Non-deterministic Constructs in OCL – What Does any() Mean -- Engineering Issues -- Integrating RT-CORBA in SDL -- Component Development: MDA Based Transformation from eODL to CIDL -- Service Discovery and…
Scenarios: Models, Transformations and Tools -- Why Timed Sequence Diagrams Require Three-Event Semantics -- Some Methodological Observations Resulting from Experience Using LSCs and the Play-In/Play-Out Approach -- Deciding Properties of Message Sequence Charts -- Operational Semantics of Security Protocols -- Autonomous Shuttle System Case Study -- Genetic Design: Amplifying Our Ability to De…
Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks -- Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks -- Towards an Integrated Protein-Protein Interaction Network -- The Factor Graph Network Model for Biological Systems -- Pairwise Local Alignment of Protein Interaction Networks Guided by Models of Evolution -- Finding Nov…
Applications -- ILTIS – The Legacy of a Successful Product -- A Reference Control Architecture for Service Robots Implemented on a Climbing Vehicle -- An Ada Framework for QoS-Aware Applications -- Design and Scheduling Issues -- Efficient Alternatives for Implementing Fixed-Priority Schedulers -- A New Strategy for the HRT-HOOD to Ada Mapping -- Using the AADL to Describe Distributed Applica…
Basic Concepts -- Problem Formulations -- Convex and Lagrangian Relaxations -- Decomposition Methods -- Semidefinite Relaxations -- Convex Underestimators -- Cuts, Lower Bounds and Box Reduction -- Local and Global Optimality Criteria -- Adaptive Discretization of Infinite Dimensional MINLPs -- Algorithms -- Overview of Global Optimization Methods -- Deformation Heuristics -- Rounding, Partitio…
Predicting Genetic Regulatory Response Using Classification: Yeast Stress Response -- Detecting Functional Modules of Transcription Factor Binding Sites in the Human Genome -- Fishing for Proteins in the Pacific Northwest -- PhyloGibbs: A Gibbs Sampler Incorporating Phylogenetic Information -- Application of Kernel Method to Reveal Subtypes of TF Binding Motifs -- Learning Regulatory Network Mo…