| 475 | -- | 476 | E. Eugene Schultz. Issues concerning the distribution of vulnerability information |
| 486 | -- | 493 | Hazel Lacohée, Andrew D. Phippen, Steven Furnell. Risk and restitution: Assessing how users establish online trust |
| 494 | -- | 497 | Rossouw von Solms, Sebastiaan H. von Solms. Information security governance: Due care |
| 498 | -- | 506 | Vinay M. Igure, Sean A. Laughter, Ronald D. Williams. Security issues in SCADA networks |
| 507 | -- | 521 | Vassilis Kapsalis, Loukas Hadellis, Dimitris Karelis, Stavros A. Koubias. A dynamic context-aware access control architecture for e-services |
| 522 | -- | 538 | Maria Kjaerland. A taxonomy and comparison of computer security incidents from the commercial and government sectors |
| 539 | -- | 550 | Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data |