Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical…
Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Compu…
FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion De…
Design Methodology -- Domain-Crossing Software Product Lines in Embedded Automotive Systems -- Mechatronics Design and Verification -- Modeling and Specification -- Pattern-based Analysis in Distributed Development of Embedded Systems -- An Embedded SW Design Exploration Approach based on UML Estimation Tools -- Software Synthesis and Power Management -- Embedded Hard Real-Time Software Synthes…
Special Session on Grid and System Software -- TeraGrid: A Foundation for US Cyberinfrastructure -- Globus Toolkit Version 4: Software for Service-Oriented Systems -- System Software for China National Grid -- Session 1: Grid Computing -- CGSV: An Adaptable Stream-Integrated Grid Monitoring System -- Performance Modeling and Analysis for Resource Scheduling in Data Grids -- Study on ?-Calculus …
Keynote Talk -- The Development of Oz and Mozart -- Security -- The Structure of Authority: Why Security Is Not a Separable Concern -- The Oz-E Project: Design Guidelines for a Secure Multiparadigm Programming Language -- Computer Science Education -- A Program Verification System Based on Oz -- Higher Order Programming for Unordered Minds -- Software Engineering -- Compiling Formal Specificati…
Securing Publish/Subscribe for Multi-domain Systems -- ABACUS: A Distributed Middleware for Privacy Preserving Data Sharing Across Private Data Warehouses -- Causeway: Support for Controlling and Analyzing the Execution of Multi-tier Applications -- MINERVA?: A Scalable Efficient Peer-to-Peer Search Engine -- An Optimal Overlay Topology for Routing Peer-to-Peer Searches -- Combining Flexibility…
Telemedical Applications and Grid Technology -- Statistical Modeling and Segmentation in Cardiac MRI Using a Grid Computing Approach -- A Grid Molecular Simulator for E-Science -- Application Driven Grid Developments in the OpenMolGRID Project -- ATLAS Data Challenge 2: A Massive Monte Carlo Production on the Grid -- High Throughput Computing for Spatial Information Processing (HIT-SIP) System …
Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficien…
Efficient Collision Search Attacks on SHA-0 -- Finding Collisions in the Full SHA-1 -- Pebbling and Proofs of Work -- Composition Does Not Imply Adaptive Security -- On the Discrete Logarithm Problem on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption -- Unconditional Characteriza…