Abstract is missing.
- Biometrics - How to Put to Use and How Not at All?Andreas Pfitzmann. 1-7 [doi]
- A Map of Trust between Trading PartnersJohn K. Debenham, Carles Sierra. 8-17 [doi]
- Implementation of a TCG-Based Trusted Computing in Mobile DeviceSuGil Choi, Jin-Hee Han, JeongWoo Lee, Jongpil Kim, SungIk Jun. 18-27 [doi]
- A Model for Trust Metrics AnalysisIsaac Agudo, M. Carmen Fernández Gago, Javier Lopez. 28-37 [doi]
- Patterns and Pattern Diagrams for Access ControlEduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie. 38-47 [doi]
- A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing ApplicationsIndrakshi Ray, Manachai Toahchoodee. 48-58 [doi]
- A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP TelephonyDimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis. 59-68 [doi]
- Multilateral Secure Cross-Community Reputation Systems for Internet CommunitiesFranziska Pingel, Sandra Steinbrecher. 69-78 [doi]
- Fairness Emergence through Simple ReputationAdam Wierzbicki, Radoslaw Nielek. 79-89 [doi]
- Combining Trust and Reputation Management for Web-Based ServicesAudun Jøsang, Touhid Bhuiyan, Yue Xu, Clive Cox. 90-99 [doi]
- Controlling Usage in Business Process Workflows through Fine-Grained Security PoliciesBenjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori. 100-117 [doi]
- Spatiotemporal Connectives for Security Policy in the Presence of Location HierarchySubhendu Aich, Shamik Sural, Arun K. Majumdar. 118-127 [doi]
- BusiROLE: A Model for Integrating Business Roles into Identity ManagementLudwig Fuchs, Anton Preis. 128-138 [doi]
- The Problem of False Alarms: Evaluation with Snort and DARPA 1999 DatasetGina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke. 139-150 [doi]
- A Generic Intrusion Detection Game Model in IT SecurityIoanna Kantzavelou, Sokratis K. Katsikas. 151-162 [doi]
- On the Design Dilemma in Dining Cryptographer NetworksJens O. Oberender, Hermann de Meer. 163-172 [doi]
- Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive ComputingSusana Alcalde Bagüés, Jelena Mitic, Andreas Zeidler, Marta Tejada, Ignacio R. Matias, Carlos Fernandez Valdivielso. 173-184 [doi]
- A User-Centric Protocol for Conditional Anonymity RevocationSuriadi Suriadi, Ernest Foo, Jason Smith. 185-194 [doi]
- Preservation of Privacy in Thwarting the Ballot Stuffing SchemeWesley Brandi, Martin S. Olivier, Alf Zugenmaier. 195-204 [doi]