Abstract is missing.
- Proactive Containment of Malice in Survivable Distributed SystemsMichael G. Merideth, Priya Narasimhan. 3-9
- Network Intrusion Detection System Using Random Projection TechniqueHongmei Deng, Qing-An Zeng, Dharma P. Agrawal. 10-16
- Additional Security Requirements to Integrate Wireless NetworksThomas Droste, Wolfgang Weber. 17-19
- An Integrated Network-Wide Defense Framework (INwDF) for Large NetworksJinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang. 20-26
- Hardware Support for Active NetworkingAlexandros G. Fragkiadakis, Nikolaos G. Bartzoudis, David J. Parish, Mark Sandford. 27-33
- Identifying Security Threats in Ad Hoc Wireless NetworkKafi Hassan, Michael Conner. 34-40
- The Pull Model of TrustDavid Grawrock. 41-47
- Prioritizing Facts for On-Line Trust NegotiationNed M. Smith. 48-54
- Establishing Confidence in Untrusted Storage ProvidersTodd A. Anderson, Vijay Tewari. 55-64
- Security in Mobility ManagementHassan Aljifri, Nizar Tyrewalla. 65-71
- Security Vulnerabilities in the Trust-List PKISimeon Xenitellis, Pita Jarupunphol. 72-77
- An ISEP (Improved Secure Electronic Payment) Protocol Design Using 3BC AlgorithmIn-Seock Cho, Byung kwan Lee, Tai-Chi Lee. 78-84
- A Secure Mobile Local Payment Application FrameworkGianluigi Me. 85-92
- Security in Pervasive Environments, What s Next?Ghita Kouadri Mostéfaoui. 93-98
- SIM Based WLAN Authentication for Open PlatformsAbhay Dharmadhikari, Uttam Sengupta, Ameen Ahmad, Roger Chandler. 99-104
- A Shoulder-Surfing Resistant Graphical Password Scheme - WIWShushuang Man, Dawei Hong, Manton M. Matthews. 105-111
- Multi-Bits Image Watermarking Technique Against Geometrical AttacksJung-Soo Lee, Han Ho Lee, Jong-Weon Kim. 112-117
- A Tamper-Detecting Implementation of LispDennis Heimbigner. 118-124
- Distributed Resource Relay Under Personalized FirewallsZhuhan Jiang, Laxmikanth Gudipudi, Hiep Pham. 125-134
- Securing FIPA Agent CommunicationNiklas Borselius, Chris J. Mitchell. 135-141
- Behavior-Based Authentication in the Built EnvironmentAthanasios Agiannidis, Neil Glover, Kevin Warwick. 142-148
- Secure Multi-Agent ComputationsRegine Endsuleit, Thilo Mie. 149-155
- The Case for Abstracting Security PoliciesAnil Madhavapeddy, Alan Mycroft, David Scott, Richard Sharp. 156-160
- User Assisted Verification of Non-Repudiation and Similar PropertiesPadmanabhan Krishnan, Robert Bannerman. 161-170
- IDS Vulnerability Analysis Using Genertia Red TeamsGerry V. Dozier. 171-176
- The Design of WEB Stegodata Detection Systems Using Intrusion Detection SystemsKyoung-Hwa Do, Kun-Won Jang, Sang-Hun Lee, Moon-Seog Jun. 177-182
- Security Management in IP Metro Ethernet/ETTx NetworksM. Ammar Rayes, Michael Cheung. 183-189
- Design of a Fault-Tolerant Mechanism for Multi-Agent Based Intrusion Detection SystemMyung-Kyu Yi, MaengSoon Baik, Chong-Sun Hwang. 190-198
- Security Policy Management for Handheld DevicesWayne A. Jansen, Tom Karygiannis, Michaela Iorga, Serban I. Gavrila, Vlad Korolev. 199-204
- A PKI Architecture for Academic Institutions: Design and PrototypePavan K. Sura, Ravi Mukkamala. 205-212
- Implementing a Prototype of the Security Framework for Distributed Brokering SystemsYan Yan, Yi Huang, Geoffrey Fox, Shrideep Pallickara, Marlon E. Pierce, Ali Kaplan, Ahmet E. Topcu. 212-218
- Alert Analysis Using Data Mining for Security Policy Server in Policy Based Network Security ManagementKyeong Ja Jeong, Moon Sun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim. 219-225
- Implementing Policy-Based Content Filtering for Web ServersTony White, Eugen Bacic. 226-232
- Trusted Platforms and Integrity Management: Scaling TCPA to the EnterpriseRon Forrester. 233-240
- Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF:::2n+1:::(2)Jing Wu, Tianbing Xia, Jennifer Seberry. 241-247
- Defeating DoS Attacks Using Wavelet AnalysisYoung-Jun Heo, Jongsoo Jang. 248-252
- Petra-r Cryptographic Hash FunctionsMohannad Najjar. 253-259
- On Differential Power Analysis Attack on the Addition Modular 2:::N::: Operation of Smart CardsHee Bong Choi, Hyoon Jae Lee, Choon Su Kim, Byung Hwa Chang, Dongho Won. 260-266
- Delegatable Authorization Program and Its ApplicationChun Ruan, Vijay Varadharajan, Yan Zhang. 267-273
- Personalized Filtering Agent for E-Mail ClassificationOk-Ran Jeong, Dong-Sub Cho. 274-280
- Assessing Power Substation Network Security and Survivability: A Work in Progress ReportCarol Taylor, Paul W. Oman, Axel W. Krings. 281-287
- Limits of Signature-Based Detection of Buffer Overflow AttacksSungsu Kim, Kyubum Wee. 288-293
- A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission InheritanceJongSoon Park, YoungLok Lee, HyungHyo Lee, BongNam Noh. 294-302
- Automated Resource Manager for Group SecurityJames F. Smith III. 303-309
- KDD Feature Set Complaint Heuristic Rules for R2L Attack DetectionMaheshkumar Sabhnani, Gürsel Serpen. 310-316
- FDS Model: A Distributed Architectural Design for Management of Inbound Network Traffic on Web-Server SystemsYanet Manzano. 317-323
- Agent Based Intrusion Tolerance Scheme in Ad Hoc NetworksKyoung-Ja Kim, Sung-Ock Hong, Tae-Mu Chang. 324-329
- Spanning Tree Search Model to Traceback DDoS Attack Using NetflowManhee Lee, Sangkil Jung, Younjoo Kwon, KookHan Kim, Jeonghoon Moon, Okhwan Byeon. 330-333
- The Development for the Risk Assessment Methodology of Spiral ModelYoon-Jung Jung, In-Jung Kim. 334-336
- Design of Policy-Based Security Management for Intrusion DetectionSu-Hyung Jo, Jeong-Nyeo Kim, Sung Won Sohn. 337-340
- A New Factoring AlgorithmEvon M. Abu-Taieh, Sattar J. Aboud. 341-347
- Web Services Security Overview and Security Proposal for UDDI FrameworkPeyman Nasirifard. 348-351
- Stability Verification of Proxy Firewall Using Colored Petri NetsMoon-Ku Lee. 352-358
- Intrusion Detection System ModelsLau Nga Sin, Moon-Chuen Lee. 359-366