Abstract is missing.
- Unconditionally Secure Authenticated Encryption with Shorter KeysBasel Alomair, Radha Poovendran. 5-15
- Deterministic Cryptanalysis of some Stream CiphersPino Caballero-Gil, Amparo Fúster-Sabater, Candelaria Hernández-Goya. 16-25
- Enhancing Rights Management Systems through the Development of Trusted Value NetworksVíctor Torres, Jaime Delgado, Xavier Maroñas, Silvia Llorente, Marc Gauvin. 26-35
- An Enhanced Approach to using Virtual Directories for Protecting Sensitive InformationWilliam Claycomb, Dongwan Shin. 36-45
- Risk-Aware Secure Supply Chain Master PlanningAxel Schröpfer, Florian Kerschbaum, Dagmar Sadkowiak, Richard Pibernik. 46-56
- MMSM-SME: Methodology for the Management of Security and its Maturity in SMELuís Enrique Sanchez, Antonio Santos-Olmo Parra, Eduardo Fernández-Medina, Mario Piattini. 67-78
- Security as a Service - A Reference Architecture for SOA SecurityMukhtiar Memon, Michael Hafner, Ruth Breu. 79-89
- Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix RelationJonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li. 93-102
- Rethinking Self-organized Public-key Management for Mobile Ad-Hoc NetworksCandelaria Hernández-Goya, Pino Caballero-Gil, Amparo Fúster-Sabater. 103-110
- DLδε-OrBAC: Context based Access ControlBoustia Narhimene, Aïcha Mokhtari. 111-118
- A Model Driven Approach for Generating Code from Security RequirementsÓscar Sánchez Ramón, Fernando Molina, Jesús García Molina, José Ambrosio Toval Álvarez. 119-126
- Managing Security Knowledge through Case based ReasoningCorrado Aaron Visaggio, Francesca de Rosa. 127-136