All Stories

  1. Anticipating Disasters Through a Security Twin
  2. Robust by design: Designing ICT infrastructures using Twins
  3. Satisfying Least Privilege Through Database Decomposition
  4. Database Decomposition to satisfy the Least Privilege Principle in Healthcare
  5. Hyperledger Fabric Enabled Vaccine Intelligent Network to Implement Immunization Program
  6. Impact of Decentralization on Electronic Voting Systems: A Systematic Literature Survey
  7. SentiTrust: A New Trust Model for Decentralized Online Social Media
  8. Discovering How to Attack a System
  9. Defending from Supply Chain Attacks
  10. Twin Based Continuous Patching To Minimize Cyber Risk
  11. TACL: Trust-Based and Scalable Access Control for IoT Using Blockchain
  12. Blockchain Smart Contract for Scalable Data Sharing in IoT: A Case Study of Smart Agriculture
  13. Blockchain-based access control management for Decentralized Online Social Networks
  14. Twin based Continuous ICT Risk Management
  15. Context-Aware and Dynamic Role-Based Access Control Using Blockchain
  16. Applying Resilience to Hybrid Threats
  17. Avoiding the weaknesses of a penetration test
  18. Protecting Personal Data Using Smart Contracts
  19. Sequential pattern mining for ICT risk assessment and management
  20. Sequential Pattern Mining for ICT Risk Assessment and Prevention
  21. Using S-Rules to Fire Dynamic Countermeasures
  22. A risk mitigation approach for autonomous cloud intrusion response system
  23. An Extension of Haruspex to Cover Vulnerabilities in Application Environments
  24. Assessing and Managing Risk by Simulating Attack Chains
  25. Security Stress: Evaluating ICT Robustness Through a Monte Carlo Method
  26. Assessing and managing the information and communication risk of power generation
  27. Harùspex: A suite to assess and manage ICT risk by simulating threat agents
  28. Iterative selection of countermeasures for intelligent threat agents
  29. Iterative Selection of Cost-Effective Countermeasures for Intelligent Threat Agents
  30. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
  31. CyVar: Extending Var-At-Risk to ICT
  32. Evaluating risk without data
  33. Assessing and Managing ICT Risk with Partial Information
  34. Automating the assessment of ICT risk
  35. Simulating Attack Plans Against ICT Infrastructures
  36. A Scenario Method to Automatically Assess ICT Risk
  37. GVScan: Scanning Networks for Global Vulnerabilities
  38. Assessing ICT risk through a Monte Carlo method
  39. HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems
  40. QSec: Supporting Security Decisions on an IT Infrastructure
  41. CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks
  42. CIDS: A Framework for Intrusion Detection in Cloud Systems
  43. An Obfuscation-Based Approach against Injection Attacks
  44. Attestation of integrity of overlay networks
  45. Unbounded impacts and risk mitigation in billing infrastructures
  46. A simulation-driven approach for assessing risks of complex systems
  47. Securing a Community Cloud
  48. Semantic Attestation of Node Integrity in Overlays
  49. Message from the UbiSafe-09 Chairs
  50. Hierarchical, model-based risk management of critical infrastructures
  51. Call for Papers for Special Issue on Security in Computer and Cyber-Physical Systems and Networks
  52. Transparent Process Monitoring in a Virtual Environment
  53. Modeling and Managing Risk in Billing Infrastructures
  54. PsycoTrace: Virtual and Transparent Monitoring of a Process Self
  55. Towards High Assurance Networks of Virtual Machines
  56. Measuring Semantic Integrity for Remote Attestation
  57. Semantics-Driven Introspection in a Virtual Environment
  58. Managing Critical Infrastructures through Virtual Network Communities
  59. Virtual interacting network community
  60. Secure Sharing of an ICT Infrastructure through Vinci
  61. Risk management of an information infrastructure: a framework based upon security dependencies
  62. Security and Integrity of a Distributed File Storage in a Virtual Environment
  63. Security and Integrity of a Distributed File Storage in a Virtual Environment
  64. Building Trustworthy Intrusion Detection through VM Introspection
  65. Building Trustworthy Intrusion Detection through VM Introspection
  66. Improving Responsiveness By Locality In Distributed Virtual Environments
  67. Parallel Hierarchical Radiosity: The PIT Approach
  68. Assessing the Risk of an Information Infrastructure Through Security Dependencies
  69. SEAS, a secure e-voting protocol: Design and implementation
  70. A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures
  71. SEAS: A Secure E-Voting Applet System
  72. MPI on a virtual shared memory
  73. Improving Grid Services Security with Fine Grain Policies
  74. PIT: A Library for the Parallelization of Irregular Problems
  75. Integrating load balancing and locality in the parallelization of irregular problems
  76. Collecting Remote Data in Irregular Problems with Hierarchical Representation of the Domain
  77. Hive: Implementing a Virtual Distributed Shared Memory in Java
  78. A Hierarchical Approach to Irregular Problems
  79. Parallelization of Irregular Problems Based on Hierarchical Domain Representation
  80. Adaptive Multigrid Methods in MPI
  81. Q-learning and redundancy reduction in classifier systems with internal state
  82. Load balancing and locality in hierarchical N-body algorithms on distributed memory architectures
  83. Massively parallel execution of logic programs: A static approach
  84. Q-Learning and Parallelism in Evolutionary Rule Based Systems
  85. A Tool for Parallel System Configuration and Program Mapping based on Genetic Algorithms
  86. Q-learning in Evolutionary Rule Based Systems
  87. P3M: A Virtual Machine Approach to Massively Parallel Computing
  88. DEBUGGING ENVIRONMNET
  89. An architectural model for OR-parallellism on distributed memory systems
  90. Parallel Implementation of a Multi-Layer Perceptron
  91. Strategies for a massively parallel implementation of simulated annealing
  92. Distributed implementation of nested communicating sequential processes: Communication and termination
  93. Parallelism issues in multi — Style computers
  94. Design of Highly Decentralized Operating Systems
  95. Development of a debugger for a concurrent language
  96. Structuring Processes as a Sequence of Nested Atomic Actions
  97. Static checking of interprocess communication in ECSP
  98. Static checking of interprocess communication in ECSP
  99. Development of a debugger for a concurrent language
  100. Development of a debugger for a concurrent language
  101. Development of a debugger for a concurrent language
  102. Two Layers Distributed Shared Memory
  103. A tool for the static optimization of concurrent programs
  104. Short Paper: Policy Driven Virtual Machine Monitor for Protected Grids
  105. Evaluation of a virtual shared memory machine by the compilation of data parallel loops
  106. DVSA and SHOE: support to shared data structures on distributed memory architectures
  107. General purpose massively parallel systems: the role of programming environments
  108. Architectural models and design methodologies for general-purpose highly-parallel computers
  109. Pisa parallel processing project on general-purpose highly-parallel computers