Abstract is missing.
- Shielding RBAC Infrastructures from CyberterrorismAndrás Belokosztolszki, David M. Eyers. 3-14
- Privilege Administration for the Role Graph ModelCecilia Ionita, Sylvia L. Osborn. 15-25
- Implementing RBAC PoliciesSteve Barker, Paul Douglas, Terry Fanning. 27-36
- Role Delegation for a Resource-Based Security ModelM. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting. 37-48
- Using X.509 Attribute Certificates for Role-Based EAMDongwan Shin, Gail-Joon Ahn, Sangrae Cho. 49-60
- Implementing Workflow SystemsLucas C. J. Dreyer, Martin S. Olivier. 61-72
- Multiphase Damage Confinement System for DatabasesPeng Liu, Ying Wang. 75-87
- Analyzing Transaction Logs for Effective Damage AssessmentPrahalad Ragothaman, Brajendra Panda. 89-101
- Deductive Database SecuritySteve Barker. 103-114
- Towards Secure XML FederationsLingyu Wang, Duminda Wijesekera, Sushil Jajodia. 117-131
- Secure XML ViewsAndrei Stoica, Csilla Farkas. 133-146
- Distributed Cooperative Updates of XML DocumentsElisa Bertino, Elena Ferrari, Giovanni Mella. 147-159
- On Security and Privacy Risks in Association Mining AlgorithmsTom Johnsten, Vijay V. Raghavan, Kevin Hill. 163-174
- Mining Malicious Corruption of Data with Hidden Markov ModelsDaniel Barbará, Rajni Goel, Sushil Jajodia. 175-189
- A Study of Inference Problems in Distributed DatabasesLiWu Chang, Ira S. Moskowitz. 191-204
- Uniform Indexing for Geospatial Data and AuthorizationsVijayalakshmi Atluri, Pietro Mazzoleni. 207-218
- Access Control of SVG DocumentsErnesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati. 219-230
- On Modeling Computer Networks for Vulnerability AnalysisClinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa. 233-244
- On-line Intrusion Protection by Detecting Attacks with DiversityJames C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich. 245-256
- Recertification: A Technique to Improve Services in PKIRavi Mukkamala, Satyam Das, Mahantesh Halappanavar. 259-270
- A Hybrid PKI Model: Application to Secure MediationJoachim Biskup, Yücel Karabulut. 271-282
- Implementation and Verification of Programmable SecurityStephen Magill, Bradley Skaggs, Mauricio Papa, John Hale. 285-299
- A Process Algebraic Approach to Security PoliciesPeter Ryan, Ragni Ryvold Arnesen. 301-312
- Anonymous and Secure Multicast SubscriptionIndrajit Ray, Indrakshi Ray. 313-327
- Privacy and Civil LibertiesDavid Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham. 331-346