Abstract is missing.
- Invited Talk - Inference Control Problems in Statistical Database Query SystemsLawrence H. Cox. 1-13
- Attribute Mutability in Usage ControlJaehong Park, Xinwen Zhang, Ravi S. Sandhu. 15-29
- STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal AuthorizationsVijayalakshmi Atluri, Qi Guo. 31-47
- An Extended Analysis of Delegating ObligationsAndreas Schaad. 49-64
- Implementing Real-Time Update of Access Control PoliciesIndrakshi Ray, Tai Xin. 65-80
- Defending Against Additive Attacks with Maximal Errors in Watermarking Relational DatabasesYingjiu Li, Vipin Swarup, Sushil Jajodia. 81-94
- Performance-Conscious Key Management in Encrypted DatabasesHakan Hacigümüs, Sharad Mehrotra. 95-109
- Damage Discovery in Distributed Database SystemsYanjun Zuo, Brajendra Panda. 111-123
- Information Flow Analysis for File Systems and Databases Using LabelsEhud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce. 125-141
- Refusal in Incomplete DatabasesJoachim Biskup, Torben Weibert. 143-157
- Why Is this User Asking so Many Questions? Explaining Sequences of QueriesAybar C. Acar, Amihai Motro. 159-176
- Invited Talk - Towards Semantics-Aware Access ControlErnesto Damiani, Sabrina De Capitani di Vimercati. 177-188
- RBAC/MAC Security Analysis and Design for UMLThuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting. 189-203
- Secure Bridges: A Means to Conduct Secure Teleconferences over Public TelephonesInja Youn, Duminda Wijesekera. 205-218
- Policy-based Security Management for Enterprise SystemsRavi Mukkamala, L. Chekuri, Mohammed A. Moharrum, S. Palley. 219-233
- A Pattern System for Access ControlTorsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul. 235-249
- A Design for Parameterized RolesMei Ge, Sylvia L. Osborn. 251-264
- Efficient Verification of Delegation in Distributed Group Membership ManagementLadislav Huraj, Helmut Reiser. 265-280
- Web Resource Usage Control in RSCLPSteve Barker. 281-294
- Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer CooperationIndrajit Ray, Tomas Hajek. 295-309
- On The Damage and Compensation of Privacy LeakageDa-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen. 311-324
- An Experimental Study of Distortion-Based Techniques for Association Rule HidingEmmanuel D. Pontikakis, Achilleas A. Tsitsonis, Vassilios S. Verykios. 325-339
- Privacy-Preserving Multi-Party Decision Tree InductionJustin Z. Zhan, LiWu Chang, Stan Matwin. 341-355
- Configuring Storage Area Networks for Mandatory SecurityBenjamin Aziz, Simon N. Foley, John Herbert, Garret Swart. 357-370
- A Framework for Trusted Wireless Sensor NetworksJoon S. Park, Abhishek Jain. 371-384