Abstract is missing.
- A logical framework for reasoning about policies with trust negotiations and workflows in a distributed environmentPhilippe Balbiani, Yannick Chevalier, Marwa El Houri. 3-11 [doi]
- A secured delegation of remote services on IPv6 home networksStere Preda, Laurent Toutain, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro. 12-18 [doi]
- CryptoNET: Secure federation protocol and authorization policies for SMIAbdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer. 19-25 [doi]
- Formal analysis of attacks for e-voting systemKomminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita. 26-34 [doi]
- Data disclosure risk evaluationSlim Trabelsi, Vincent Salzgeber, Michele Bezzi, Gilles Montagnon. 35-72 [doi]
- Runtime verification of declassification for imperative programs: Formal foundationsThomas Demongeot, Julien Mallet, Yves Le Traon. 43-50 [doi]
- SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-dataJonathan-Christofer Demay, Eric Totel, Frédéric Tronel. 51-58 [doi]
- Re-inforced stealth breakpointsAmit Vasudevan. 59-66 [doi]
- Permutation-based steganographic channelsKevin Forest, Scott Knight. 67-73 [doi]
- A formal methodology for detection of vulnerabilities in an enterprise information systemAnirban Sengupta, Chandan Mazumdar, Aditya Bagchi. 74-81 [doi]
- A reference model for risk-aware business process managementStefan Jakoubi, Simon Tjoa. 82-89 [doi]
- Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco networksAndrea Bobbio, Ester Ciancamerla, Saverio Di Blasi, Alessandro Iacomini, Federico Mari, Igor Melatti, Michele Minichino, Alessandro Scarlatti, Enrico Tronci, Roberta Terruggia, Emilio Zendri. 90-97 [doi]
- Greylisting - long term analysis of anti-SPAM effectTomas Sochor. 98-104 [doi]
- Experiments and data analysis of electronic voting systemKomminist Weldemariam, Adolfo Villafiorita, Andrea Mattioli. 105-112 [doi]
- Modeling dependencies in security risk managementTansu Alpcan, Nicholas Bambos. 113-116 [doi]
- A quantitative approach to assess information security related risksAnton Romanov, Eiji Okamoto. 117-122 [doi]
- Untrustworthiness: A trust-based security metricAfonso Araújo Neto, Marco Vieira. 123-126 [doi]
- Honeypot router for routing protocols protectionAbdallah Ghourabi, Tarek Abbes, Adel Bouhoula. 127-130 [doi]
- A formal design of secure information systems by using a Formal Secure Data Flow Diagram (FSDFD)Nadia Soudain, Bel G. Raggad, Belhassen Zouari. 131-134 [doi]