| 464 | -- | 473 | E. Eugene Schultz. Security views: Online piracy battle heats up in US |
| 474 | -- | 478 | Stephen Hinde. Spam: the evolution of a nuisance |
| 482 | -- | 486 | John Leach. Security engineering and security RoI |
| 487 | -- | 493 | Robert S. Coles, Rolf Moulton. Operationalizing IT Risk Management |
| 494 | -- | 505 | Andrew Blyth, Daniel Cunliffe, Iain Sutherland. Security analysis of XML usage and XML parsing |
| 506 | -- | 510 | Christopher Kelly, Chris Nelms. Roadmap to checking data migration |
| 511 | -- | 514 | Elisa Bertino. RBAC models - concepts and trends |
| 515 | -- | 516 | Brian McKenna. Web services set to provoke new sthreats: Preview of Compsec 2003, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK |
| 523 | -- | 526 | Hung-Yu Chien, Jinn-ke Jan. New hierarchical assignment without Public Key cryptography |
| 527 | -- | 534 | Tzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang. Efficient proxy multisignature schemes based on the elliptic curve cryptosystem |
| 535 | -- | 546 | Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun. Security middleware for enhancing interoperability of Public Key Infrastructure |
| 547 | -- | 550 | Shyi-Tsong Wu, Bin-Chang Chieu. A user friendly remote authentication scheme with smart cards |