Abstract is missing.
- Benefits of Federated Identity Management - A Survey from an Integrated Operations ViewpointJostein Jensen. 1-12 [doi]
- A Security Policy Model for Agent Based Service-Oriented ArchitecturesEckehard Hermann. 13-25 [doi]
- A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare SettingMaria B. Line, Inger Anne Tøndel, Erlend Andreas Gjære. 26-37 [doi]
- Usage Control Enforcement - A SurveyÅsmund Ahlmann Nyre. 38-49 [doi]
- Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire MonitoringManuela Núñez-Redó, Laura Díaz, José Gil, David González, Joaquín Huerta. 50-68 [doi]
- The Problem of Conceptual Incompatibility - Exploring the Potential of Conceptual Data Independence to Ease Data IntegrationSimon McGinnes. 69-81 [doi]
- Integrating Patient-Related Entities Using Hospital Information System Data and Automatic Analysis of Free TextSvetla Boytcheva, Galia Angelova, Zhivko Angelov, Dimitar Tcharaktchiev, Hristo Dimitrov. 89-101 [doi]
- A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) ApplicationsRatnesh Sahay, Ronan Fox, Antoine Zimmermann, Axel Polleres, Manfred Hauswirth. 102-117 [doi]
- Application of Answer Set Programming for Public Health Data Integration and AnalysisMonica L. Nogueira, Noel P. Greis. 118-134 [doi]
- Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion DetectionTomasz Hachaj, Marek R. Ogiela. 135-148 [doi]
- Hierarchical Knowledge Structure Applied to Image Analyzing System - Possibilities of Practical UsageKrzysztof Wójcik. 149-163 [doi]
- Evaluation of Topological Vulnerability of the Internet under Regional FailuresWei Peng, Zimu Li, Jinshu Su, Muwei Dong. 164-175 [doi]
- VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and LossMasaya Sato, Toshihiro Yamauchi. 176-190 [doi]
- Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack DetectionFrancesco Flammini, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini. 191-204 [doi]
- Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things DevicesLeandro Marin, Antonio J. Jara, Antonio F. Gómez-Skarmeta. 205-219 [doi]
- Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological ChangesMiroslaw Trzupek. 220-227 [doi]
- Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian NetworkWei Zhao, Goo-Rak Kwon, Sang-Woong Lee. 228-242 [doi]
- Extended Spatio-temporal Relations between Moving and Non-moving ObjectsChang Choi, Junho Choi, Juhyun Shin, Ilsun You, PanKoo Kim. 243-254 [doi]
- A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless NetworksFang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang. 255-270 [doi]
- Securing Location-Aware Services Based on Online/Offline Signatures in VANETsChul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee. 271-285 [doi]
- A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic AnalysisMunkhbaatar Doyoddorj, Kyung Hyune Rhee. 286-294 [doi]
- Learning Web Application Firewall - Benefits and CaveatsDariusz Palka, Marek Zachara. 295-308 [doi]
- A Novel Chaining Approach to Indirect Control Transfer InstructionsWei Chen, Zhiying Wang, Qiang Dou, Yongwen Wang. 309-320 [doi]
- A Study on Context Services Model with Location PrivacyHoon Ko, Goreti Marreiros, Zita Vale, Jongmyung Choi. 321-329 [doi]
- Digital Profiling: A Computer Forensics ApproachClara Maria Colombini, Antonio Colella. 330-343 [doi]
- New Steganographic Techniques for the OOXML File FormatAniello Castiglione, Bonaventura D Alessio, Alfredo De Santis, Francesco Palmieri. 344-358 [doi]
- Automated Construction of a False Digital AlibiAlfredo De Santis, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Mario Ianulardo. 359-373 [doi]
- IT Issues on Homeland Security and DefenseKangbin Yim, Ilsun You. 374-385 [doi]