Abstract is missing.
- Privacy and Security Issues in a Digital WorldMilan Petkovic, Willem Jonker. 3-10 [doi]
- Privacy in the LawJeroen Terstegge. 11-20 [doi]
- Ethical Aspects of Information Security and PrivacyPhilip Brey. 21-36 [doi]
- Authorization and Access ControlSabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. 39-53 [doi]
- Role-Based Access ControlSylvia L. Osborn. 55-70 [doi]
- XML SecurityClaudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. 71-86 [doi]
- Database SecurityElisa Bertino, Ji-Won Byun, Ashish Kamra. 87-101 [doi]
- Trust ManagementClaudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. 103-117 [doi]
- Trusted PlatformsKlaus Kursawe. 119-131 [doi]
- Strong Authentication with Physical Unclonable FunctionsPim Tuyls, Boris Skoric. 133-148 [doi]
- Privacy-Preserving Data MiningLjiljana Brankovic, Md Zahidul Islam, Helen Giggins. 151-165 [doi]
- Statistical Database SecurityLjiljana Brankovic, Helen Giggins. 167-181 [doi]
- Different Search Strategies on Encrypted Data ComparedRichard Brinkman. 183-196 [doi]
- Client-Server Trade-Offs in Secure ComputationBerry Schoenmakers, Pim Tuyls. 197-211 [doi]
- Federated Identity ManagementJan Camenisch, Birgit Pfitzmann. 213-238 [doi]
- Accountable Anonymous CommunicationClaudia Díaz, Bart Preneel. 239-253 [doi]
- An Introduction to Digital Rights Management SystemsWillem Jonker. 257-265 [doi]
- Copy Protection SystemsJoop Talstra. 267-285 [doi]
- Forensic Watermarking in Digital Rights ManagementMichiel van der Veen, Aweke N. Lemma, Mehmet Utku Celik, Stefan Katzenbeisser 0001. 287-302 [doi]
- Person-Based and Domain-Based Digital Rights ManagementPaul Koster. 303-316 [doi]
- Digital Rights Management InteroperabilityFrank Kamperman. 317-331 [doi]
- DRM for Protecting Personal ContentHong Li, Milan Petkovic. 333-346 [doi]
- Enhancing Privacy for Digital Rights ManagementMilan Petkovic, Claudine Conrado, Geert Jan Schrijen, Willem Jonker. 347-364 [doi]
- The Persuasiveness of Ambient IntelligenceEmile H. L. Aarts, Panos Markopoulos, Boris E. R. de Ruyter. 367-381 [doi]
- Privacy PoliciesMarnix Dekker, Sandro Etalle, Jerry den Hartog. 383-397 [doi]
- Security and Privacy on the Semantic WebDaniel Olmedilla. 399-415 [doi]
- Private Person Authentication in an Ambient WorldPim Tuyls, Tom A. M. Kevenaar. 417-431 [doi]
- RFID and PrivacyMarc Langheinrich. 433-450 [doi]
- Malicious Software in Ubiquitous ComputingMorton Swimmer. 451-466 [doi]