Presentation of the PPR-Model -- The Activity and Customer Centric Approach -- The Domains and Directions of IT Impacts -- Digital Wheelbarrows in Local Government -- E-Government Objectives, Means, and Reach -- The Organizational Membrane Penetrated by Mobile Technologies -- E-Procurement: The Improvement of Supporting and Strategic Operations -- Instrumental Digital Customer Involvement -- Ev…
Invited Talks -- Attached Types and Their Application to Three Open Problems of Object-Oriented Programming -- The Emergent Structure of Development Tasks -- Java -- Loosely-Separated “Sister” Namespaces in Java -- Efficiently Refactoring Java Applications to Use Generic Libraries -- Sharing the Runtime Representation of Classes Across Class Loaders -- Aspects and Modularity -- Aspect-Orien…
Two-Server Password-Only Authenticated Key Exchange -- Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks -- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution -- A Traitor Tracing Scheme Based on RSA for Fast Decryption -- N-Par…
Theory of System Performance Analysis -- Time—The Zeroth Performance Metric -- Getting the Jump on Queueing -- Queueing Systems for Computer Systems -- Linux Load Average—Take a Load Off! -- Performance Bounds and Log Jams -- Practice of System Performance Analysis -- Pretty Damn Quick (PDQ)—A Slow Introduction -- Multicomputer Analysis with PDQ -- How to Scale an Elephant with PDQ -- Cli…
Information Models and Metrics -- On the Formalization of the Common Information Model Metaschema -- Ontology-Based Integration of Management Behaviour and Information Definitions Using SWRL and OWL -- On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study -- Security and Privacy -- Improving the Configuration Management of Large Network Security S…
Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- C…
Invited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Li…
MOTIVATION AND MODELING ISSUES -- Databases: The Integrative Force in Cyberspace -- Federating Location-Based Data Services -- An Agent-Based Approach to Correctness in Databases -- INFRASTRUCTURAL SERVICES -- Thirty Years of Server Technology — From Transaction Processing to Web Services -- Caching over the Entire User-to-Data Path in the Internet -- Reweaving the Tapestry: Integrating Datab…
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Resul…
Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -…