MOTIVATION AND MODELING ISSUES -- Databases: The Integrative Force in Cyberspace -- Federating Location-Based Data Services -- An Agent-Based Approach to Correctness in Databases -- INFRASTRUCTURAL SERVICES -- Thirty Years of Server Technology — From Transaction Processing to Web Services -- Caching over the Entire User-to-Data Path in the Internet -- Reweaving the Tapestry: Integrating Datab…
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Resul…
Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -…
Side Channels I -- Resistance of Randomized Projective Coordinates Against Power Analysis -- Templates as Master Keys -- A Stochastic Model for Differential Side Channel Cryptanalysis -- Arithmetic for Cryptanalysis -- A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis -- Further Hidden Markov Model Cryptanalysis -- Low Resources -- Energy-Efficient Software Implementat…
Panels -- COTS Component-Based Embedded Systems – A Dream or Reality? -- Free and Proprietary Software in COTS-Based Software Development -- Workshops -- 2nd International Workshop on Incorporating COTS into Software Systems: Assessment and Prediction of Behavior and QoS Attributes of COTS Software Components and Systems -- Challenges of COTS IV & V -- Tutorials -- The COTS Product Market: An…
Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical…
CMMI RAMS Extension Based on CENELEC Railway Standard -- The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems -- Combining Extended UML Models and Formal Methods to Analyze Real-Time Systems -- Defining and Decomposing Safety Policy for Systems of Systems -- Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment -- Control and Dat…
Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Compu…
The Problem of Computer Insecurity -- The Need to Raise Awareness -- Common Failings That Compromise Security -- The Widespread Nature of Vulnerability -- Attack and Exploitation of Systems -- External Influences and Dependencies -- Insecurity: Here Today, Here Tomorrow?.Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recen…
FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion De…