5 | -- | 38 | Maria Luisa Damiani, Elisa Bertino, Paolo Perlasca. Data security in location-aware applications: an approach based on RBAC |
39 | -- | 63 | Robert Johnson, Jessica Staddon. Deflation-secure web metering |
64 | -- | 108 | Sarath Indrakanti, Vijay Varadharajan, Ritesh Agarwal. On the design, implementation and application of an authorisation architecture for web services |
109 | -- | 142 | Guy G. Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Yanxin Wang, Xia Wang, Natalia Stakhanova. Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems |
143 | -- | 168 | Vijayalakshmi Atluri, Soon Ae Chun. A geotemporal role-based authorisation system |
169 | -- | 184 | Natalia Stakhanova, Samik Basu, Johnny Wong. A taxonomy of intrusion response systems |
185 | -- | 200 | Lili Yang, Shuang-Hua Yang. A framework of security and safety checking for internet-based control systems |
201 | -- | 209 | Ya-Fen Chang, Chin-Chen Chang. An RSA-based (t, n) threshold proxy signature scheme with freewill identities |
210 | -- | 233 | Khidir M. Ali, Thomas J. Owens. Selection of an EAP authentication method for a WLAN |