Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols --…
Invited Talk (Abstract) -- Pervasive Computing – A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk …
Invited Talk -- ECRYPT: The Cryptographic Research Challenges for the Next Decade -- Reduction of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions for Public-Key Encryption Schemes -- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel -- Signature Schemes -- A Provably Secure Short Transitive Signature Scheme fr…
New Research Challenges for the Security of Ad Hoc and Sensor Networks -- Public Key Cryptography in Sensor Networks—Revisited -- Exploring Message Authentication in Sensor Networks -- Secure Initialization in Single-Hop Radio Networks -- Some Methods for Privacy in RFID Communication -- Ring Signature Schemes for General Ad-Hoc Access Structures -- Linking Ad Hoc Charging Schemes to AAAC Arc…
Efficient Verifiable Ring Encryption for Ad Hoc Groups -- SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations -- Remote Software-Based Attestation for Wireless Sensors -- Spontaneous Cooperation in Multi-domain Sensor Networks -- Authenticated Queries in Sensor Networks -- Improving Sensor Network Security with Information Quality -- One-Time Sensors: A Novel …
Typical Group Key Management Schemes -- Tree Based Key Management Schemes -- Dynamic Conferencing Schemes -- Secure Group Communications with Hierarchical Access Control -- SGC Challenges and SGC for Wireless Networks -- Concluding Remarks.This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over data networks. It offers an over…
Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontol…
Language Issues -- ULF-Ware – An Open Framework for Integrated Tools for ITU-T Languages -- An Access Control Language for Dynamic Systems – Model-Driven Development and Verification -- Non-deterministic Constructs in OCL – What Does any() Mean -- Engineering Issues -- Integrating RT-CORBA in SDL -- Component Development: MDA Based Transformation from eODL to CIDL -- Service Discovery and…
Component-Based Design of Embedded Software: An Analysis of Design Issues -- Component-Based Design of Embedded Software: An Analysis of Design Issues -- How Design Patterns Affect Application Performance – A Case of a Multi-tier J2EE Application -- An MDA-Based Approach for Inferring Concurrency in Distributed Systems -- Task-Based Access Control for Virtual Organizations -- Self-Deployment …
Data-Based Applications -- to OGSA-DAI Services -- Using OGSA-DQP to Support Scientific Applications for the Grid -- Mobile Agent-Based Service Provision in Distributed Data Archives -- A Proxy Service for the xrootd Data Server -- A Flexible Two-Level I/O Architecture for Grids -- Data Driven Infrastructure and Policy Selection to Enhance Scientific Applications in Grid -- BioApplications -- M…