Abstract is missing.
- Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population SafetyDixie B. Baker. 3-22 [doi]
- Shamon: A System for Distributed Mandatory Access ControlJonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer. 23-32 [doi]
- A Framework for a Collaborative DDoS DefenseGeorge C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson. 33-42 [doi]
- V-COPS: A Vulnerability-Based Cooperative Alert Distribution SystemShiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia. 43-56 [doi]
- Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted MachineRavi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian. 57-66 [doi]
- KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret ProxyDinei A. F. Florêncio, Cormac Herley. 67-76 [doi]
- Vulnerability Analysis of MMS User AgentsCollin Mulliner, Giovanni Vigna. 77-88 [doi]
- Backtracking Algorithmic Complexity Attacks against a NIDSRandy Smith, Cristian Estan, Somesh Jha. 89-98 [doi]
- NetSpy: Automatic Generation of Spyware Signatures for NIDSHao Wang, Somesh Jha, Vinod Ganapathy. 99-108 [doi]
- Detecting Policy Violations through Traffic AnalysisJeffrey Horton, Reihaneh Safavi-Naini. 109-120 [doi]
- Practical Attack Graph Generation for Network DefenseKyle Ingols, Richard Lippmann, Keith Piwowarski. 121-130 [doi]
- Secure Distributed Cluster Formation in Wireless Sensor NetworksKun Sun, Pai Peng, Peng Ning, Cliff Wang. 131-140 [doi]
- Specification-Based Intrusion Detection in WLANsRupinder Gill, Jason Smith, Andrew Clark. 141-152 [doi]
- From Languages to Systems: Understanding Practical Application Development in Security-typed LanguagesBoniface Hicks, Kiyan Ahmadizadeh, Patrick Drew McDaniel. 153-164 [doi]
- An Internet Voting System Supporting User PrivacyAggelos Kiayias, Michael Korman, David Walluck. 165-174 [doi]
- A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access LogsLillian Røstad, Ole Edsberg. 175-186 [doi]
- Engineering Sufficiently Secure ComputingBrian Witten. 187-202 [doi]
- A Module System for Isolating Untrusted Software ExtensionsPhilip W. L. Fong, Simon A. Orr. 203-212 [doi]
- How to Automatically and Accurately Sandbox Microsoft IISWei Li, Lap-Chung Lam, Tzi-cker Chiueh. 213-222 [doi]
- Data Sandboxing: A Technique for Enforcing Confidentiality PoliciesTejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan. 223-234 [doi]
- On Detecting Camouflaging WormWei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao. 235-244 [doi]
- Bluetooth Worms: Models, Dynamics, and Defense ImplicationsGuanhua Yan, Stephan Eidenbenz. 245-256 [doi]
- Back to the Future: A Framework for Automatic Malware Removal and System RepairFrancis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su. 257-268 [doi]
- Static Detection of Vulnerabilities in x86 ExecutablesMarco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna. 269-278 [doi]
- Foreign Code Detection on the Windows/X86 PlatformSusanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh. 279-288 [doi]
- PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing MalwarePaul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee. 289-300 [doi]
- Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure WindowingJeremy Epstein. 301-320 [doi]
- Risks of UntrustworthinessPeter G. Neumann. 321-328 [doi]
- Address-Space Randomization for Windows SystemsLixin Li, James E. Just, R. Sekar. 329-338 [doi]
- Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity SoftwareChongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning. 339-348 [doi]
- Known/Chosen Key Attacks against Software Instruction Set RandomizationYoav Weiss, Elena Gabriela Barrantes. 349-360 [doi]
- Automatic Evaluation of Intrusion Detection SystemsFrédéric Massicotte, François Gagnon, Yvan Labiche, Lionel C. Briand, Mathieu Couture. 361-370 [doi]
- Offloading IDS Computation to the GPUNigel Jacob, Carla E. Brodley. 371-380 [doi]
- Anomaly Based Web Phishing Page DetectionYing Pan, Xuhua Ding. 381-392 [doi]
- Addressing SMTP-Based Mass-Mailing Activity within Enterprise NetworksDavid Whyte, Paul C. van Oorschot, Evangelos Kranakis. 393-402 [doi]
- Using Attribute-Based Access Control to Enable Attribute-Based MessagingRakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana. 403-413 [doi]
- Enhancing Collaborative Spam Detection with Bloom FiltersJeff Yan, Pook Leong Cho. 414-428 [doi]
- Extended Protection against Stack Smashing Attacks without Performance LossYves Younan, Davide Pozza, Frank Piessens, Wouter Joosen. 429-438 [doi]
- PAST: Probabilistic Authentication of Sensor TimestampsAshish Gehani, Surendar Chandra. 439-448 [doi]
- Towards Database Firewall: Mining the Damage Spreading PatternsKun Bai, Peng Liu. 449-462 [doi]
- A General Dynamic Information Flow Tracking Framework for Security ApplicationsLap-Chung Lam, Tzi-cker Chiueh. 463-472 [doi]
- Covert and Side Channels Due to Processor ArchitectureZhenghong Wang, Ruby B. Lee. 473-482 [doi]
- CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage ProtectionGuillaume Duc, Ronan Keryell. 483-492 [doi]
- Protecting Privacy in Key-Value Search SystemsYinglian Xie, Michael K. Reiter, David R. O Hallaron. 493-504 [doi]