| 813 | -- | 814 | Eugene H. Spafford. Security, technology, publishing, and ethics (Part I) |
| 815 | -- | 830 | Jinpeng Wei, Calton Pu. Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems |
| 831 | -- | 839 | Michael Workman. A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives |
| 840 | -- | 847 | E. Kritzinger, Sebastiaan H. von Solms. Cyber security for home users: A new way of protection through awareness enforcement |
| 848 | -- | 858 | Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati. Access control for smarter healthcare using policy spaces |
| 859 | -- | 874 | Ioanna Kantzavelou, Sokratis K. Katsikas. A game-based intrusion detection mechanism to confront internal attackers |
| 875 | -- | 890 | Javier Herranz, Stan Matwin, Jordi Nin, Vicenç Torra. Classifying data from protected statistical datasets |
| 891 | -- | 902 | Fred Cohen. A method for forensic analysis of control |