Prologue -- Walk-through: Using UML for Security -- Background -- Developing Secure Systems -- Model-based Security Engineering with UML -- Applications -- Tool Support -- Tool support for UMLsec -- A Formal Foundation -- Formal Systems Development with UML -- Epilogue -- Further Material -- Outlook.Attacks against computer systems can cause considerable economic or physical damage. High-qualit…
Part 1: Fundamental and legal questions. 1. Legal fundamentalism: is data protection really a fundamental right? Bart Van der Sloot -- 2. Is there a Right to Offline Alternatives in a Digital World? Murat Karaboga, Tobias Matzner, Hannah Obersteller and Carsten Ochs -- 3. What is New with the Internet of Things in Privacy and Data Protection? Four Legal Challenges. Ugo Pagallo, Massimo Durante …
I. Introduction; A Comparative Overview of the Secondary Liability of Internet Service Providers; Graeme B. Dinwoodie -- II. Sources and Concepts -- The Different bases for Secondary Liability of Service Providers in Poland; Xawery Konarski and Tomasz Targosz -- Secondary Liability of Internet Service Providers in The United States: General Principles and Fragmentation; Salil K. Mehra and Marke…
Part I: Cyberspace -- On how the Cyberspace arose to fulfill theoretical physicists' needs and eventually changed the world: Personal recallings and a practitioner's perspective -- Narrative mapping of cyberspace. Context and consequences -- A Conceptual and Legal Approach to The Cyberspace: The dilemma security vs. Freedom -- The digital revolution in underdeveloped countries: brief analysis o…
Information Technology Security -- How can we justify trust in software based systems? -- The capacity of ciphers fulfilling the accessibility of cryptograms -- Parallelization of the Data Encryption Standard (DES) algorithm -- Linked authenticated dictionaries for certificate status verification -- Integrated Payment System for Public Key Infrastructure Services -- Some methods of the analysis…
FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion De…
Themes and Issues -- Dealing with Terabyte Data Sets in Digital Investigations -- Forensics and Privacy-Enhancing Technologies -- A Network-Based Architecture for Storing Digital Evidence -- Digital Forensics: Meeting the Challenges of Scientific Evidence -- Non-Technical Manipulation of Digital Data -- Investigative Techniques -- Detecting Social Engineering -- A Framework for Email Investigat…
Analysis and Prediction of Design Model Evolution Using Time Series -- An Evolutionary Improvement of the Mahalanobis - Taguchi Strategy and Its Application to Intrusion Detection -- Zero-Knowledge Private Computation of Node Bridgeness in Social Networks -- Valuation and Selection of OSS with Real Options -- State of the Art in Context Modelling - A Systematic Literature Review -- On the Appli…