| 174 | -- | 175 | . From the editor-in-chief: Virus and worm trends |
| 176 | -- | 187 | E. Eugene Schultz. Security views |
| 188 | -- | 192 | Stephen Hinde. Cyber-terrorism in context |
| 193 | -- | 195 | Hank Wolfe. Evidence acquisition |
| 196 | -- | 203 | Hassan Aljifri, Diego Sánchez Navarro. International legal aspects of cryptography: Understanding cryptography |
| 204 | -- | 206 | Rolf Moulton, Robert S. Coles. A contest to evaluate IT security services management |
| 207 | -- | 211 | Chris Pounder. Governments act to improve security |
| 214 | -- | 232 | Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen. Analysis of vulnerabilities in Internet firewalls |
| 233 | -- | 244 | Helen van de Haar, Rossouw von Solms. A model for deriving information security control attribute profiles |
| 245 | -- | 255 | Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang. Generalization of proxy signature-based on discrete logarithms |
| 256 | -- | 264 | Phillip J. Brooke, Richard F. Paige. Fault trees for security system design and analysis |