Abstract is missing.
- GOSSIB vs. IP Traceback RumorsMarcel Waldvogel. 5-13 [doi]
- Composable Tools For Network Discovery and Security AnalysisGiovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer. 14-24 [doi]
- Representing TCP/IP Connectivity For Topological Analysis of Network SecurityRonald W. Ritchey, Brian O Berry, Steven Noel. 25-34 [doi]
- Regulating E-Commerce through Certified Contracts35-43 [doi]
- With Gaming Technology towards Secure User InterfacesHanno Langweg. 44-50 [doi]
- Protecting Web Usage of Credit Cards Using One-Time Pad Cookie EncryptionDonghua Xu, Chenghuai Lu, André L. M. dos Santos. 51-60 [doi]
- Throttling Viruses: Restricting propagation to defeat malicious mobile codeMatthew M. Williamson. 61-68 [doi]
- Enforcing Resource Bound Safety for Mobile SNMP AgentsWeijiang Yu, Aloysius K. Mok. 69-77 [doi]
- Security of Internet Location ManagementTuomas Aura, Michael Roe, Jari Arkko. 78-90 [doi]
- Wireless Security: Vulnerabilities and CountermeasuresDale M. Johnson. 91-95 [doi]
- LOCK : An Historical PerspectiveO. Sami Saydjari. 96-108 [doi]
- A Practical Approach to Identifying Storage and Timing Channels: Twenty Years LaterRichard A. Kemmerer. 109-118 [doi]
- Thirty Years Later: Lessons from the Multics Security EvaluationPaul A. Karger, Roger R. Schell. 119-148 [doi]
- Controlled Physical Random FunctionsBlaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas. 149-160 [doi]
- A Security Architecture for Object-Based Distributed SystemsBogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum. 161-171 [doi]
- A Secure Directory Service based on Exclusive EncryptionJohn R. Douceur, Atul Adya, Josh Benaloh, William J. Bolosky, Gideon Yuval. 172-184 [doi]
- Penetration Testing: A DuetDaniel Geer, John Harthorne. 185-198 [doi]
- Protecting Data from Malicious SoftwareMatthew Schmid, Frank Hill, Anup K. Ghosh. 199-208 [doi]
- Safe Virtual Execution Using Software Dynamic TranslationKevin Scott, Jack W. Davidson. 209-218 [doi]
- Digging For Worms, Fishing For AnswersFlorian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith. 219-228 [doi]
- A Framework for Organisational Control PrinciplesAndreas Schaad, Jonathan D. Moffett. 229-238 [doi]
- Reusable Components for Developing Security-Aware ApplicationStefan Probst, Wolfgang Eßmayr, Edgar Weippl. 239-248 [doi]
- A Context-Aware Security Architecture for Emerging ApplicationsMichael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad. 249-260 [doi]
- Voice over IPsec: Analysis and SolutionsRoberto Barbieri, Danilo Bruschi, Emilia Rosti. 261-270 [doi]
- Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust NetworkMichael Clifford. 271-281 [doi]
- Gender-Preferential Text Mining of E-mail DiscourseMalcolm Corney, Olivier Y. de Vel, Alison Anderson, George M. Mohay. 282-292 [doi]
- Enterprise Engineering And Security: Enterprise Frameworks and Architectures, and IA PatternsDuane Hybertson, A. Reedy, S. Chapin, M. Kirwan Jr.. 293-296 [doi]
- Themes and Highlights of the New Security Paradigms Workshop 2002Cristina Serban, O. Sami Saydjari. 297-300 [doi]
- Evaluating the Impact of Automated Intrusion Response MechanismsThomas Toth, Christopher Krügel. 301-310 [doi]
- Architectures for Intrusion Tolerant Database SystemsPeng Liu. 311-320 [doi]
- Detecting and Defending against Web-Server FingerprintingDustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt. 321-332 [doi]
- Advanced Features for Enterprise-Wide Role-Based Access ControlAxel Kern. 333-342 [doi]
- Access Control for Active SpacesGeetanjali Sampemane, Prasad Naldurg, Roy H. Campbell. 343-352 [doi]
- A Model for Attribute-Based User-Role AssignmentMohammad A. Al-Kahtani, Ravi S. Sandhu. 353-364 [doi]
- Intrusion Detection: Current Capabilities and Future DirectionsKarl N. Levitt. 365-370 [doi]
- Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security DecisionMary Ellen Zurko, Charlie Kaufman, Katherine Spanbauer, Chuck Bassett. 371-381 [doi]
- A Financial Institution s Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC StandardAndrew D. Marshall. 382-390 [doi]
- Security Architecture of the Austrian Citizen Card ConceptHerbert Leitold, Arno Hollosi, Reinhard Posch. 391-402 [doi]
- Malicious Code Detection for Open FirmwareFrank Adelstein, Matthew Stillerman, Dexter Kozen. 403-412 [doi]
- Beyond the Perimeter: the Need for Early Detection of Denial of Service AttacksJohn Haggerty, Qi Shi, Madjid Merabti. 413-422 [doi]
- A Toolkit for Detecting and Analyzing Malicious SoftwareMichael Weber, Matthew Schmid, Michael Schatz, David Geyer. 423 [doi]