All Stories

  1. Robust by design: Designing ICT infrastructures using Twins
  2. Satisfying Least Privilege Through Database Decomposition
  3. Database Decomposition to satisfy the Least Privilege Principle in Healthcare
  4. Hyperledger Fabric Enabled Vaccine Intelligent Network to Implement Immunization Program
  5. Impact of Decentralization on Electronic Voting Systems: A Systematic Literature Survey
  6. SentiTrust: A New Trust Model for Decentralized Online Social Media
  7. Discovering How to Attack a System
  8. Defending from Supply Chain Attacks
  9. Twin Based Continuous Patching To Minimize Cyber Risk
  10. TACL: Trust-Based and Scalable Access Control for IoT Using Blockchain
  11. Blockchain Smart Contract for Scalable Data Sharing in IoT: A Case Study of Smart Agriculture
  12. Blockchain-based access control management for Decentralized Online Social Networks
  13. Twin based Continuous ICT Risk Management
  14. Context-Aware and Dynamic Role-Based Access Control Using Blockchain
  15. Applying Resilience to Hybrid Threats
  16. Avoiding the weaknesses of a penetration test
  17. Protecting Personal Data Using Smart Contracts
  18. Sequential pattern mining for ICT risk assessment and management
  19. Sequential Pattern Mining for ICT Risk Assessment and Prevention
  20. Using S-Rules to Fire Dynamic Countermeasures
  21. A risk mitigation approach for autonomous cloud intrusion response system
  22. An Extension of Haruspex to Cover Vulnerabilities in Application Environments
  23. Assessing and Managing Risk by Simulating Attack Chains
  24. Security Stress: Evaluating ICT Robustness Through a Monte Carlo Method
  25. Assessing and managing the information and communication risk of power generation
  26. Harùspex: A suite to assess and manage ICT risk by simulating threat agents
  27. Iterative selection of countermeasures for intelligent threat agents
  28. Iterative Selection of Cost-Effective Countermeasures for Intelligent Threat Agents
  29. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
  30. CyVar: Extending Var-At-Risk to ICT
  31. Evaluating risk without data
  32. Assessing and Managing ICT Risk with Partial Information
  33. Automating the assessment of ICT risk
  34. Simulating Attack Plans Against ICT Infrastructures
  35. A Scenario Method to Automatically Assess ICT Risk
  36. GVScan: Scanning Networks for Global Vulnerabilities
  37. Assessing ICT risk through a Monte Carlo method
  38. HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems
  39. QSec: Supporting Security Decisions on an IT Infrastructure
  40. CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks
  41. CIDS: A Framework for Intrusion Detection in Cloud Systems
  42. An Obfuscation-Based Approach against Injection Attacks
  43. Attestation of integrity of overlay networks
  44. Unbounded impacts and risk mitigation in billing infrastructures
  45. A simulation-driven approach for assessing risks of complex systems
  46. Securing a Community Cloud
  47. Semantic Attestation of Node Integrity in Overlays
  48. Message from the UbiSafe-09 Chairs
  49. Hierarchical, model-based risk management of critical infrastructures
  50. Call for Papers for Special Issue on Security in Computer and Cyber-Physical Systems and Networks
  51. Transparent Process Monitoring in a Virtual Environment
  52. Modeling and Managing Risk in Billing Infrastructures
  53. PsycoTrace: Virtual and Transparent Monitoring of a Process Self
  54. Towards High Assurance Networks of Virtual Machines
  55. Measuring Semantic Integrity for Remote Attestation
  56. Semantics-Driven Introspection in a Virtual Environment
  57. Managing Critical Infrastructures through Virtual Network Communities
  58. Virtual interacting network community
  59. Secure Sharing of an ICT Infrastructure through Vinci
  60. Risk management of an information infrastructure: a framework based upon security dependencies
  61. Security and Integrity of a Distributed File Storage in a Virtual Environment
  62. Security and Integrity of a Distributed File Storage in a Virtual Environment
  63. Building Trustworthy Intrusion Detection through VM Introspection
  64. Building Trustworthy Intrusion Detection through VM Introspection
  65. Improving Responsiveness By Locality In Distributed Virtual Environments
  66. Parallel Hierarchical Radiosity: The PIT Approach
  67. Assessing the Risk of an Information Infrastructure Through Security Dependencies
  68. SEAS, a secure e-voting protocol: Design and implementation
  69. A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures
  70. SEAS: A Secure E-Voting Applet System
  71. MPI on a virtual shared memory
  72. Improving Grid Services Security with Fine Grain Policies
  73. PIT: A Library for the Parallelization of Irregular Problems
  74. Integrating load balancing and locality in the parallelization of irregular problems
  75. Collecting Remote Data in Irregular Problems with Hierarchical Representation of the Domain
  76. Hive: Implementing a Virtual Distributed Shared Memory in Java
  77. A Hierarchical Approach to Irregular Problems
  78. Parallelization of Irregular Problems Based on Hierarchical Domain Representation
  79. Adaptive Multigrid Methods in MPI
  80. Q-learning and redundancy reduction in classifier systems with internal state
  81. Load balancing and locality in hierarchical N-body algorithms on distributed memory architectures
  82. Massively parallel execution of logic programs: A static approach
  83. Q-Learning and Parallelism in Evolutionary Rule Based Systems
  84. A Tool for Parallel System Configuration and Program Mapping based on Genetic Algorithms
  85. Q-learning in Evolutionary Rule Based Systems
  86. P3M: A Virtual Machine Approach to Massively Parallel Computing
  87. DEBUGGING ENVIRONMNET
  88. An architectural model for OR-parallellism on distributed memory systems
  89. Parallel Implementation of a Multi-Layer Perceptron
  90. Strategies for a massively parallel implementation of simulated annealing
  91. Distributed implementation of nested communicating sequential processes: Communication and termination
  92. Parallelism issues in multi — Style computers
  93. Design of Highly Decentralized Operating Systems
  94. Development of a debugger for a concurrent language
  95. Structuring Processes as a Sequence of Nested Atomic Actions
  96. Static checking of interprocess communication in ECSP
  97. Static checking of interprocess communication in ECSP
  98. Development of a debugger for a concurrent language
  99. Development of a debugger for a concurrent language
  100. Development of a debugger for a concurrent language
  101. Two Layers Distributed Shared Memory
  102. A tool for the static optimization of concurrent programs
  103. Short Paper: Policy Driven Virtual Machine Monitor for Protected Grids
  104. Evaluation of a virtual shared memory machine by the compilation of data parallel loops
  105. DVSA and SHOE: support to shared data structures on distributed memory architectures
  106. General purpose massively parallel systems: the role of programming environments
  107. Architectural models and design methodologies for general-purpose highly-parallel computers
  108. Pisa parallel processing project on general-purpose highly-parallel computers