Beginner -- Installing Zope -- The Zope 3 Component Architecture -- Interfaces -- Content Components -- Persistency -- Presenting components on the web -- Intermediate -- Customizing a site’s layout -- Internationalization -- Adapters -- Automated testing -- Views -- Metadata -- Containers -- Expert -- Events -- Vocabularies -- Sites -- Security -- Authentication and user management.New Zope …
Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry --…
Invited Talks -- Digital Fountains and Their Application to Informed Content Delivery over Adaptive Overlay Networks -- Securing the Net: Challenges, Failures and Directions -- Regular Papers -- Coterie Availability in Sites -- Keeping Denial-of-Service Attackers in the Dark -- On Conspiracies and Hyperfairness in Distributed Computing -- On the Availability of Non-strict Quorum Systems -- Musi…
Network Security -- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience -- POSSET – Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Si…
Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling…
Life Science Grid -- Gene Trek in Procaryote Space Powered by a GRID Environment -- An Integrated System for Distributed Bioinformatics Environment on Grids -- Distributed Cell Biology Simulations with E-Cell System -- The Architectural Design of High-Throughput BLAST Services on OBIGrid -- Heterogeneous Database Federation Using Grid Technology for Drug Discovery Process -- Grid Portal Interfa…
Invited Talk -- Pattern Matching over a Dynamic Network of Tuple Spaces -- Models and Calculi -- A Dynamic Class Construct for Asynchronous Concurrent Objects -- An Abstract Machine for the Kell Calculus -- XPi: A Typed Process Calculus for XML Messaging -- UML -- Checking the Validity of Scenarios in UML Models -- An Extended Type System for OCL Supporting Templates and Transformations -- A Se…
Invited Talks -- Security by, and for, Converged Mobile Devices -- Security for Ubiquitous Computing -- Block Cipher and Stream Cipher -- Algebraic Attacks on Combiners with Memory and Several Outputs -- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA -- Dragon: A Fast Word Based Stream Cipher -- Public Key Cryptosystem -- An Efficient and Verifiable Solution to t…
Hard Real-Time Development Environments -- Executive Overview on Hard Real-Time Development Environments -- Hard Real-Time System Development -- Current Design Practice and Needs in Selected Industrial Sectors -- Tools for Requirements Capture and Exploration -- Tools for Architecture Design and Capture -- Tools for Programming, Code Generation, and Design -- Tools for Verification and Validati…
Adaptation, Power Consumption and Scheduling -- Energy Management for Embedded Multithreaded Processors with Integrated EDF Scheduling -- Reducing System Level Power Consumption for Mobile and Embedded Platforms -- Implementing Control Algorithms Within a Multithreaded Java Microcontroller -- Adaptivity for Quality and Timeliness Flexible Real-Time Systems -- Adaptation and Agents -- Apricot Ag…