| 247 | -- | 0 | Dimitris Gritzalis, Sokratis K. Katsikas. Editorial |
| 248 | -- | 259 | John Gerdes Jr., Joakim Kalvenes, Chin-Tser Huang. Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements |
| 260 | -- | 275 | Qi Li, Xinwen Zhang, Mingwei Xu, Jianping Wu. Towards secure dynamic collaborations with group-based RBAC model |
| 276 | -- | 288 | Hyunsang Choi, Heejo Lee, Hyogon Kim. Fast detection and visualization of network attacks on parallel coordinates |
| 289 | -- | 300 | Mildrey Carbonell, José María Sierra, Javier Lopez. Secure multiparty payment with an intermediary entity |
| 301 | -- | 309 | Ming-Yang Su, Gwo-Jong Yu, Chun-Yuen Lin. A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach |
| 310 | -- | 324 | Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider. Specifying authentication using signal events in CSP |