241 | -- | 245 | Paul Brusil, John Hale. The Shifting Sands of Security Management |
247 | -- | 251 | M. E. Kabay. Improving Information Assurance Education Key to Improving Secure(ity) Management |
253 | -- | 267 | Jerald Dawkins, K. Clark, G. Manes, Mauricio Papa. A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks |
269 | -- | 291 | Yi Hu, Brajendra Panda. Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems |
293 | -- | 308 | Ganapathi Padmavathi, Samukutty Annadurai. Improved Key Management Technique for Secure Multicasting over IP |
309 | -- | 328 | Carla Merkle Westphall, Joni da Silva Fraga. Mandatory and Discretionary Policies for CORBA Security |
329 | -- | 344 | Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi. NetGlean: A Methodology for Distributed Network Security Scanning |
345 | -- | 350 | Prem Chand. Building A Standards Driven Security Framework for New Generation Operations Software and Systems (NGOSS) - The TeleManagement Forum (TMF) Approach |
351 | -- | 354 | Alexander Clemm, Olivier Festor, Aiko Pras. Managing New Networked Worlds - A Report on IM 2005 |