Invited Paper -- Applications of Craig Interpolants in Model Checking -- Regular Model-Checking -- Verifying Programs with Dynamic 1-Selector-Linked Structures in Regular Model Checking -- Simulation-Based Iteration of Tree Transducers -- Using Language Inference to Verify Omega-Regular Properties -- Infinite State Systems -- On-the-Fly Reachability and Cycle Detection for Recursive State Machi…
Fair Exchange -- An Evenhanded Certified Email System for Contract Signing -- Efficient ID-Based Optimistic Fair Exchange with Provable Security -- On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol -- Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery -- Digital Signatures I -- Cryptanalysis of a Forward Secure Blind Signature Scheme…
Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security -- Traversing Middleboxes with the Host Identity Protocol -- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generat…
Web GIS -- Web Services Framework for Geo-spatial Services -- Temporal and Spatial Attribute Extraction from Web Documents and Time-Specific Regional Web Search System -- Mobile GIS and LBS -- Broadcasting and Prefetching Schemes for Location Dependent Information Services -- A Geocoding Method for Natural Route Descriptions Using Sidewalk Network Databases -- Location-Based Tour Guide System U…
Generic Relationships in Information Modeling -- EMMA – A Formal Basis for Querying Enhanced Multimedia Meta Objects -- Comparing and Transforming Between Data Models Via an Intermediate Hypergraph Data Model -- iASA: Learning to Annotate the Semantic Web -- A Survey of Schema-Based Matching Approaches -- An Overview and Classification of Adaptive Approaches to Information Extraction -- View…
Intelligent Techniques for Web Personalization -- Intelligent Techniques for Web Personalization -- User Modelling -- Modeling Web Navigation: Methods and Challenges -- The Traits of the Personable -- Addressing Users’ Privacy Concerns for Improving Personalization Quality: Towards an Integration of User Studies and Algorithm Evaluation -- Recommender Systems -- Case-Based Recommender Systems…
Geospatial Semantics: Why, of What, and How? -- Spherical Topological Relations -- GeoPQL: A Geographical Pictorial Query Language That Resolves Ambiguities in Query Interpretation -- A Fuzzy Identity-Based Temporal GIS for the Analysis of Geomorphometry Changes -- Interoperability for GIS Document Management in Environmental Planning -- Semantic Information in Geo-Ontologies: Extraction, Compa…
Keynotes -- Web Engineering Milieu -- Evaluation and Verification -- Non-functional Requirements / Testing -- Miscellaneous 1 -- Query / Retrieval -- Applications 1 -- Applications 2 -- Applications 3 -- Ontologies / XML -- Semantics / Web Services -- Security -- Miscellaneous 2 -- Design 1 (Adaptation / User-Awareness) -- Design 2 (Model-Based Approaches) -- Design 3 (End-Users / Requirements)…
Symbolic Equivalences for Open Systems -- Specifying and Verifying UML Activity Diagrams Via Graph Transformation -- Mobile UML Statecharts with Localities -- Communities: Concept-Based Querying for Mobile Services -- Towards a Formal Treatment of Secrecy Against Computational Adversaries -- For-LySa: UML for Authentication Analysis -- Performance Analysis of a UML Micro-business Case Study -- …
Third International Conference on Trust Management -- Foraging for Trust: Exploring Rationality and the Stag Hunt Game -- Trust, Untrust, Distrust and Mistrust – An Exploration of the Dark(er) Side -- Security and Trust in the Italian Legal Digital Signature Framework -- Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language -- On Deciding to Trust -- Trust Management Surve…