Abstract is missing.
- Keynote speechMark Bregman. 1 [doi]
- Topological analysis of network attack vulnerabilitySushil Jajodia. 2 [doi]
- On the evolution of adversary models in security protocols: from the beginning to sensor networksVirgil D. Gligor. 3 [doi]
- Analyzing network traffic to detect self-decrypting exploit codeQinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer. 4-12 [doi]
- Network anomaly detection based on TCM-KNN algorithmYang Li, Binxing Fang, Li Guo, You Chen. 13-19 [doi]
- BASE: an incrementally deployable mechanism for viable IP spoofing preventionHeejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig. 20-31 [doi]
- Bluetooth worm propagation: mobility pattern matters!Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan Eidenbenz, Vincent Vu. 32-44 [doi]
- A ::::k::::-anonymous communication protocol for overlay networksPan Wang, Peng Ning, Douglas S. Reeves. 45-56 [doi]
- Kleptographic attacks on a cascade of mix serversPrzemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski. 57-62 [doi]
- Private stateful circuits secure against probing attacksYu Yu, Jussipekka Leiwo, Benjamin Premkumar. 63-69 [doi]
- Specifying and analyzing security automata using CSP-OZDavid A. Basin, Ernst-Rüdiger Olderog, Paul E. Sevinç. 70-81 [doi]
- Efficient techniques for realizing geo-spatial access controlMikhail J. Atallah, Marina Blanton, Keith B. Frikken. 82-92 [doi]
- A framework for decentralized access controlMeenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh. 93-104 [doi]
- Incremental adaptation of XPath access control viewsPadmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee. 105-116 [doi]
- SecureBus: towards application-transparent trusted computing with mandatory access controlXinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu. 117-126 [doi]
- Administration in role-based access controlNinghui Li, Ziqing Mao. 127-138 [doi]
- Managing RBAC states with transitive relationsChaoyi Pang, David P. Hansen, Anthony J. Maeder. 139-148 [doi]
- Trust management services in relational databasesSabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 149-160 [doi]
- Concurrently-secure credential ownership proofsSiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek. 161-172 [doi]
- Unconditionally secure ring authenticationReihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt. 173-181 [doi]
- Combinatorial characterizations of authentication codes in verification oracle modelDongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild. 183-193 [doi]
- A novel approach for a file-system integrity monitor tool of Xen virtual machineAnh-Quynh Nguyen, Yoshiyasu Takefuji. 194-202 [doi]
- Detecting relay attacks with timing-based protocolsJason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji. 204-213 [doi]
- Direct static enforcement of high-level security policiesQihua Wang, Ninghui Li. 214-225 [doi]
- An extended model of security policy for multi-applicative smart cardsMatthias Schwan. 226-233 [doi]
- Protecting RFID communications in supply chainsYingjiu Li, Xuhua Ding. 234-241 [doi]
- Universally composable and forward-secure RFID authentication and authenticated key exchangeTri Van Le, Mike Burmester, Breno de Medeiros. 242-252 [doi]
- A dynamic information flow model of secure systemsJianjun Shen, Sihan Qing. 341-343 [doi]
- Crocus: a steganographic filesystem managerHioki Hirohisa. 344-346 [doi]
- Compact FPGA implementations of QUADDavid Arditti, Côme Berbain, Olivier Billet, Henri Gilbert. 347-349 [doi]
- Elastic block ciphers: the basic designDebra L. Cook, Angelos D. Keromytis, Moti Yung. 350-352 [doi]
- Fuzzy extractors for continuous distributionsIleana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis. 353-355 [doi]
- Invisible designated confirmer signatures without random oraclesVictor K. Wei. 356-358 [doi]
- Keystroke statistical learning model for web authenticationCheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu. 359-361 [doi]
- Managing heterogeneous network environments using an extensible policy frameworkLawrence Teo, Gail-Joon Ahn. 362-364 [doi]
- Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approachXiaoxin Wu, David K. Y. Yau. 365-367 [doi]
- New constructions of fuzzy identity-based encryptionJoonsang Baek, Willy Susilo, Jianying Zhou. 368-370 [doi]
- Non-intrusive IP traceback for DDoS attacksVrizlynn L. L. Thing, Morris Sloman, Naranker Dulay. 371-373 [doi]
- Ring signatures: universally composable definitions and constructionsKazuki Yoneyama, Kazuo Ohta. 374-376 [doi]
- SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparentTae-Kyou Park, Ilkyeun Ra. 377-379 [doi]
- The energy cost of cryptographic key establishment in wireless sensor networksJohann Großschädl, Alexander Szekely, Stefan Tillich. 380-382 [doi]
- Extended privilege inheritance in RBACM. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle. 383-385 [doi]
- History-based access control for XML documentsPatrick Röder, Omid Tafreschi, Claudia Eckert. 386-388 [doi]
- Addressing interoperability issues in access control modelsVishwas Patil, Alessandro Mei, Luigi V. Mancini. 389-391 [doi]
- A framework for diversifying windows native APIs to tolerate code injection attacksLynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt. 392-394 [doi]
- DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANETChinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt. 395-397 [doi]
- Masquerade detection based on SVM and sequence-based user commands profileJeongseok Seo, Sung Deok Cha. 398-400 [doi]