Invited Talk (Abstract) -- Pervasive Computing – A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk …
Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.Security in E-Learning is organized in three parts. First, the author raises awareness that se…
New Research Challenges for the Security of Ad Hoc and Sensor Networks -- Public Key Cryptography in Sensor Networks—Revisited -- Exploring Message Authentication in Sensor Networks -- Secure Initialization in Single-Hop Radio Networks -- Some Methods for Privacy in RFID Communication -- Ring Signature Schemes for General Ad-Hoc Access Structures -- Linking Ad Hoc Charging Schemes to AAAC Arc…
Efficient Verifiable Ring Encryption for Ad Hoc Groups -- SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations -- Remote Software-Based Attestation for Wireless Sensors -- Spontaneous Cooperation in Multi-domain Sensor Networks -- Authenticated Queries in Sensor Networks -- Improving Sensor Network Security with Information Quality -- One-Time Sensors: A Novel …
Prologue -- Walk-through: Using UML for Security -- Background -- Developing Secure Systems -- Model-based Security Engineering with UML -- Applications -- Tool Support -- Tool support for UMLsec -- A Formal Foundation -- Formal Systems Development with UML -- Epilogue -- Further Material -- Outlook.Attacks against computer systems can cause considerable economic or physical damage. High-qualit…
Typical Group Key Management Schemes -- Tree Based Key Management Schemes -- Dynamic Conferencing Schemes -- Secure Group Communications with Hierarchical Access Control -- SGC Challenges and SGC for Wireless Networks -- Concluding Remarks.This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over data networks. It offers an over…
Language Issues -- ULF-Ware – An Open Framework for Integrated Tools for ITU-T Languages -- An Access Control Language for Dynamic Systems – Model-Driven Development and Verification -- Non-deterministic Constructs in OCL – What Does any() Mean -- Engineering Issues -- Integrating RT-CORBA in SDL -- Component Development: MDA Based Transformation from eODL to CIDL -- Service Discovery and…
Component-Based Design of Embedded Software: An Analysis of Design Issues -- Component-Based Design of Embedded Software: An Analysis of Design Issues -- How Design Patterns Affect Application Performance – A Case of a Multi-tier J2EE Application -- An MDA-Based Approach for Inferring Concurrency in Distributed Systems -- Task-Based Access Control for Virtual Organizations -- Self-Deployment …
Data-Based Applications -- to OGSA-DAI Services -- Using OGSA-DQP to Support Scientific Applications for the Grid -- Mobile Agent-Based Service Provision in Distributed Data Archives -- A Proxy Service for the xrootd Data Server -- A Flexible Two-Level I/O Architecture for Grids -- Data Driven Infrastructure and Policy Selection to Enhance Scientific Applications in Grid -- BioApplications -- M…
Scenarios: Models, Transformations and Tools -- Why Timed Sequence Diagrams Require Three-Event Semantics -- Some Methodological Observations Resulting from Experience Using LSCs and the Play-In/Play-Out Approach -- Deciding Properties of Message Sequence Charts -- Operational Semantics of Security Protocols -- Autonomous Shuttle System Case Study -- Genetic Design: Amplifying Our Ability to De…