Abstract is missing.
- Basic Security ConceptsSushil Jajodia, Ting Yu. 3-20 [doi]
- Access Control Policies and Languages in Open EnvironmentsSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati. 21-58 [doi]
- Trusted RecoveryMeng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia. 59-94 [doi]
- Access Control Policy Models for XMLMichiharu Kudo, Naizhen Qi. 97-126 [doi]
- Optimizing Tree Pattern Queries over Secure XML DatabasesHui Wang, Divesh Srivastava, Laks V. S. Lakshmanan, SungRan Cho, Sihem Amer-Yahia. 127-165 [doi]
- Rule-based Policy SpecificationGrigoris Antoniou, Matteo Baldoni, Piero A. Bonatti, Wolfgang Nejdl, Daniel Olmedilla. 169-216 [doi]
- Automated Trust Negotiation in Open SystemsAdam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu. 217-258 [doi]
- Building Trust and Security in Peer-to-Peer SystemsTerry Bearly, Vijay Kumar. 259-287 [doi]
- Microdata ProtectionValentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. 291-321 [doi]
- ::::k::::-AnonymityValentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. 323-353 [doi]
- Preserving Privacy in On-line Analytical Processing Data CubesLingyu Wang, Sushil Jajodia, Duminda Wijesekera. 355-380 [doi]
- Search on Encrypted DataHakan Hacigümüs, Bijit Hore, Balakrishna R. Iyer, Sharad Mehrotra. 383-425 [doi]
- Rights Assessment for Relational DataRadu Sion. 427-457 [doi]