| 531 | -- | 532 | E. Eugene Schultz. The gap between cryptography and information security: has it narrowed? |
| 533 | -- | 541 | E. Eugene Schultz. Security views |
| 542 | -- | 546 | Steve Purser. Improving the ROI of the security management process |
| 549 | -- | 558 | Ming Li. An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition |
| 559 | -- | 570 | Marijke Coetzee, Jan H. P. Eloff. Towards Web Service access control |
| 571 | -- | 577 | Tian-Fu Lee, Tzonelih Hwang, Chun-Li Lin. Enhanced three-party encrypted key exchange without server public keys |
| 578 | -- | 590 | Javier Lopez, Rolf Oppliger, Günther Pernul. Authentication and authorization infrastructures (AAIs): a comparative survey |
| 591 | -- | 605 | Jae-Myeong Jeon, Yon Dohn Chung, Myoung-Ho Kim, Yoon-Joon Lee. Filtering XPath expressions for XML access control |
| 606 | -- | 614 | Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh. Personalised cryptographic key generation based on FaceHashing |
| 615 | -- | 619 | Shin-Jia Hwang, Ching-Chung Chan. Improvement on Li et al. s generalization of proxy signature schemes |