Abstract is missing.
- An algebraic-functional framework for distributed access controlClara Bertolissi, Maribel Fernández. 1-8 [doi]
- Aspect-based enforcement of formal delegation policiesSlim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel. 9-17 [doi]
- Access control for cooperative systems: A comparative analysisAmine Baïna, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaåniche. 19-26 [doi]
- An ontology-based approach to react to network attacksNora Cuppens-Boulahia, Frédéric Cuppens, Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra, Hervé Debar. 27-35 [doi]
- Anomaly-based intrusion detection using distributed intelligent systemsBenoit Morel. 37-44 [doi]
- Policy-based intrusion detection in Web applications by monitoring Java information flowsGuillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin. 53-60 [doi]
- Efficient detection of DDoS attacks with important attributesWei Wang 0012, Sylvain Gombault. 61-67 [doi]
- A formal security framework for mobile agent systems: Specification and verificationMonia Loulou, Ahmed Hadj Kacem, Mohamed Jmaiel, Mohamed Mosbah. 69-76 [doi]
- Verification of Workflow processes under multilevel security considerationsKamel Barkaoui, Rahma Ben Ayed, Hanifa Boucheneb, Awatef Hicheur. 77-84 [doi]
- If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open networkChristophe Incoul, Benjamin Gåteau, Jocelyn Aubert, Nicolas Bounoughaz, Christophe Feltus. 85-92 [doi]
- Security analysis of the Dependability, Security Reconfigurability frameworkTim Hartog, Geert Kleinhuis. 93-100 [doi]
- Analysis of Peer-to-Peer networks from a dependability perspectiveHakem Beitollahi, Geert Deconinck. 101-108 [doi]
- A Byzantine solution to early detect massive attacksKhaled Barbaria, Belhassen Zouari. 109-116 [doi]
- Automated reaction based on risk analysis and attackers skills in intrusion detection systemsWael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, José Araujo. 117-124 [doi]
- Towards a robust privacy and anonymity preserving architecture for ubiquitous computingPierre E. Abi-Char, Mounir Mokhtari, Abdallah Mhamed, Bachar El Hassan. 125-132 [doi]
- A comparative study of secret code variants in terms of keystroke dynamicsNarainsamy Pavaday, K. M. S. Soyjaudah. 133-140 [doi]
- Reputation based clustering algorithm for security management in ad hoc networks with liarsMohamed Elhoucine Elhdhili, Lamia Ben Azzouz, Farouk Kamoun. 141-148 [doi]
- Quality assurance of Grid service provisioning by risk aware managing of resource failuresAxel Keller, Kerstin Voß, Dominic Battré, Matthias Hovestadt, Odej Kao. 149-157 [doi]
- EESP: A Security protocol that supports QoS managementMahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul. 159-167 [doi]
- Economic-based vs. nature-inspired intruder detection in sensor networksFatma Mili, Swapna Ghanekar, Nancy Alrajei. 177-184 [doi]
- Apport de la cryptographie elliptique dans le vote électroniqueSouheib Yousfi, Alexis Bonnecaze, Riadh Robbana. 185-192
- Application framework for high security requirements in R&D environments based on quantum cryptographyChristian Kollmitzer, Oliver Maurhart, Stefan Schauer, Stefan Rass. 193-197 [doi]
- A new timestamping schema in the Bounded Storage ModelAssia Ben Shil, Kaouthar Blibech, Riadh Robbana. 199-205 [doi]
- Extended UML activity diagram for composing Grid services workflowsYousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 207-212 [doi]
- Case study: Using digital signatures for the archival of medical records in hospitalsSebastian Sageder, Johannes Sametinger, Andreas Wiesauer. 213-220 [doi]
- VisAA: Visual analyzer for assemblerPhilippe Andouard, Olivier Ly, Davy Rouillard. 221-225 [doi]
- Revisiting enforceable security policiesNaoyuki Nagatou. 227-234 [doi]
- Firewalls anomalies detection system based on web services / mobile agents interactionsFakher Ben Ftima, Kamel Karoui, Henda Ben Ghzela. 235-241 [doi]
- Towards a new user Anonymity Preserving Protocol (APP) for MANETsNadia Chalabi, Mhamed Abdallah, Belhadri Messabih. 243-248 [doi]
- Formal procedural security modeling and analysisKomminist Weldemariam, Adolfo Villafiorita. 249-254 [doi]
- A new covert channel in WIFI networksLilia Frikha, Zouheir Trabelsi. 255-260 [doi]
- Comparing Chord, CAN, and Pastry overlay networks for resistance to DoS attacksHakem Beitollahi, Geert Deconinck. 261-266 [doi]
- Towards an automated firewall security policies validation processRyma Abassi, Sihem Guemara El Fatmi. 267-272 [doi]