Abstract is missing.
- Dimensions of Declassification in Theory and PracticeAndrei Sabelfeld. 1 [doi]
- A Static Birthmark of Binary Executables Based on API Call StructureSeokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han. 2-16 [doi]
- Compiling C Programs into a Strongly Typed Assembly LanguageTakahiro Kosakai, Toshiyuki Maeda, Akinori Yonezawa. 17-32 [doi]
- Information Flow TestingGurvan Le Guernic. 33-47 [doi]
- Large Scale Simulation of Tor: Gavin O Gorman, Stephen Blott. 48-54 [doi]
- Privacy Enhancing CredentialsJunji Nakazato, Lihua Wang, Akihiro Yamamura. 55-61 [doi]
- Browser Based Agile E-Voting SystemSriperumbuduru Kandala Simhalu, Keiji Takeda. 62-69 [doi]
- Risk Balance in Exchange ProtocolsMuhammad Torabi Dashti, Yanjing Wang. 70-77 [doi]
- Scalable DRM System for Media PortabilityHyoungshick Kim. 78-85 [doi]
- Computational Semantics for Basic Protocol Logic - A Stochastic ApproachGergei Bana, Koji Hasebe, Mitsuhiro Okada. 86-94 [doi]
- Management Advantages of Object Classification in Role-Based Access Control (RBAC)Mohammad Jafari, Mohammad Fathian. 95-110 [doi]
- An Integrated Model for Access Control and Information Flow RequirementsSamiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens. 111-125 [doi]
- Digital Rights Management Using a Master Control DeviceImad M. Abbadi. 126-141 [doi]
- How to do Things with Cryptographic ProtocolsJoshua D. Guttman. 142-149 [doi]
- A Formal Analysis for Capturing Replay Attacks in Cryptographic ProtocolsHan Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson. 150-165 [doi]
- An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic ProgrammingMengjun Li, Ti Zhou, Zhoujun Li, Huowang Chen. 166-180 [doi]
- Secure Verification of Location Claims with Simultaneous Distance ModificationVitaly Shmatikov, Ming-Hsiu Wang. 181-195 [doi]
- Modeling and Virtualization for Secure Computing EnvironmentsKazuhiko Kato. 196-197 [doi]
- Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack TracesE. Ramirez-Silva, Marc Dacier. 198-211 [doi]
- A Logical Framework for Evaluating Network Resilience Against Faults and AttacksElie Bursztein, Jean Goubault-Larrecq. 212-227 [doi]
- Masquerade Detection Based Upon GUI User Profiling in Linux SystemsWilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi. 228-239 [doi]
- One-Time Receiver Address in IPv6 for Protecting UnlinkabilityAtsushi Sakurai, Takashi Minohara, Ryota Sato, Keisuke Mizutani. 240-246 [doi]
- A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection AlertsJungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon. 247-253 [doi]
- Combining Heterogeneous Classifiers for Network Intrusion DetectionAli Borji. 254-260 [doi]
- Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative EnvironmentsPetros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas. 261-267 [doi]
- On Run-Time Enforcement of PoliciesHarshit Shah, R. K. Shyamasundar. 268-281 [doi]
- Static vs Dynamic Typing for Access Control in Pi-CalculusMichele Bugliesi, Damiano Macedonio, Sabina Rossi. 282-296 [doi]
- A Sandbox with a Dynamic Policy Based on Execution Contexts of ApplicationsTomohiro Shioya, Yoshihiro Oyama, Hideya Iwasaki. 297-311 [doi]