Abstract is missing.
- Application-Replay Attack on Java Cards: When the Garbage Collector Gets ConfusedGuillaume Barbu, Philippe Hoogvorst, Guillaume Duc. 1-13 [doi]
- Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering ApproachesKristian Beckers, Stephan Faßbender, Maritta Heisel, Jan-Christoph Küster, Holger Schmidt. 14-21 [doi]
- Typed Assembler for a RISC Crypto-ProcessorPeter T. Breuer, Jonathan P. Bowen. 22-29 [doi]
- Transversal Policy Conflict DetectionMatteo Maria Casalino, Henrik Plate, Slim Trabelsi. 30-37 [doi]
- Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget SettingsSamson Gejibo, Federico Mancini, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr. 38-45 [doi]
- Runtime Enforcement of Information Flow Security in Tree Manipulating ProcessesMáté Kovács, Helmut Seidl. 46-59 [doi]
- Formalisation and Implementation of the XACML Access Control MechanismMassimiliano Masi, Rosario Pugliese, Francesco Tiezzi. 60-74 [doi]
- A Task Ordering Approach for Automatic Trust EstablishmentFrancisco Moyano, M. Carmen Fernández Gago, Isaac Agudo, Javier Lopez. 75-88 [doi]
- An Idea of an Independent Validation of Vulnerability Discovery ModelsViet Hung Nguyen, Fabio Massacci. 89-96 [doi]
- A Sound Decision Procedure for the Compositionality of SecrecyMartín Ochoa, Jan Jürjens, Daniel Warzecha. 97-105 [doi]
- Plagiarizing Smartphone Applications: Attack Strategies and Defense TechniquesRahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang. 106-120 [doi]
- Design of Adaptive Security Mechanisms for Real-Time Embedded SystemsMehrdad Saadatmand, Antonio Cicchetti, Mikael Sjödin. 121-134 [doi]
- Hunting Application-Level Logical ErrorsGeorge Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis. 135-142 [doi]
- Optimal Trust Mining and Computing on Keyed MapReduceHuafei Zhu, Hong Xiao. 143-150 [doi]