Invited Talks -- Sub-linear Queries Statistical Databases: Privacy with Power -- Malicious Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinkin…
Modeling User Runtime Estimates -- Workload Analysis of a Cluster in a Grid Environment -- ScoPred–Scalable User-Directed Performance Prediction Using Complexity Modeling and Historical Data -- Open Job Management Architecture for the Blue Gene/L Supercomputer -- AnthillSched: A Scheduling Strategy for Irregular and Iterative I/O-Intensive Parallel Jobs -- An Extended Evaluation of Two-Phase …
Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings -- “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience -- A Privacy Preservi…
Harmony: The Art of Reconciliation -- A Theory of Noninterference for the ?-Calculus -- Typed Processes in Untyped Contexts -- Model–Based Testing of Cryptographic Protocols -- A General Name Binding Mechanism -- Types for Security in a Mobile World -- History-Based Access Control for Distributed Processes -- Programming Cryptographic Protocols -- A Framework for Analyzing Probabilistic Proto…
Beginner -- Installing Zope -- The Zope 3 Component Architecture -- Interfaces -- Content Components -- Persistency -- Presenting components on the web -- Intermediate -- Customizing a site’s layout -- Internationalization -- Adapters -- Automated testing -- Views -- Metadata -- Containers -- Expert -- Events -- Vocabularies -- Sites -- Security -- Authentication and user management.New Zope …
Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry --…
Invited Talks -- Digital Fountains and Their Application to Informed Content Delivery over Adaptive Overlay Networks -- Securing the Net: Challenges, Failures and Directions -- Regular Papers -- Coterie Availability in Sites -- Keeping Denial-of-Service Attackers in the Dark -- On Conspiracies and Hyperfairness in Distributed Computing -- On the Availability of Non-strict Quorum Systems -- Musi…
Network Security -- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience -- POSSET – Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Si…
Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling…
Life Science Grid -- Gene Trek in Procaryote Space Powered by a GRID Environment -- An Integrated System for Distributed Bioinformatics Environment on Grids -- Distributed Cell Biology Simulations with E-Cell System -- The Architectural Design of High-Throughput BLAST Services on OBIGrid -- Heterogeneous Database Federation Using Grid Technology for Drug Discovery Process -- Grid Portal Interfa…