Abstract is missing.
- Remote Computer Fingerprinting for Cyber Crime InvestigationsJon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi. 3-15
- Improving Damage Assessment Efficacy in case of Frequent Attacks on DatabasesPrahalad Ragothaman, Brajendra Panda. 16-30
- Delivering Services with Integrity Guarantees in Survivable Database SystemsJianyong Zhang, Peng Liu. 33-46
- Certifying Data from Multiple SourcesGlen Nuckolls, Charles U. Martel, Stuart G. Stubblebine. 47-60
- Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service ModelHakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra. 61-74
- Adapting Query Optimization Techniques for Efficient Alert CorrelationPeng Ning, Dingbang Xu. 75-88
- Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned DatabasesEhud Gudes, Boris Rozenberg. 91-104
- Privacy under Conditions of Concurrent Interaction with Multiple PartiesMartin S. Olivier. 105-118
- Correlated Data InferenceCsilla Farkas, Andrei Stoica. 119-132
- Anti-Tamper Databases: Querying Encrypted DatabasesGultekin Özsoyoglu, David A. Singer, Sun S. Chung. 133-146
- Administration Rights in the SDSD-SystemJoachim Biskup, Thomas Leineweber, Joerg Parthe. 149-162
- Secure Authorisation for Web ServicesSarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi. 163-175
- A Decentralized Approach for Controlled Sharing of Resources in Virtual CommunitiesElisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini. 176-189
- Supporting Delegation in Secure Workflow Management SystemsVijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni. 190-202
- Modifying LDAP to Support PKIDavid W. Chadwick, Edward Ball, M. V. Sahalayev. 205-214
- ECPV: Efficient Certificate Path Validation in Public-key InfrastructureMahantesh Halappanavar, Ravi Mukkamala. 215-228
- Semantics-Aware Perimeter ProtectionMarco Cremonini, Ernesto Damiani, Pierangela Samarati. 229-242
- Systematic Development of a Family of Fair Exchange ProtocolsPaul D. Ezhilchelvan, Santosh K. Shrivastava. 243-258
- High-speed Access Control for XML DocumentsJong P. Yoon. 261-274
- Chinese Wall Security Policy Models: Information Flows and Confining Trojan HorsesTsau Young Lin. 275-287
- RBAC Policy Implementation for SQL DatabasesSteve Barker, Paul Douglas. 288-301
- An Administrative Model for Role GraphsHe Wang, Sylvia L. Osborn. 302-315
- Safety and Liveness for an RBAC/MAC Security ModelCharles E. Phillips, Steven A. Demurjian, T. C. Ting. 316-329
- Schema Based XML Security: RBAC ApproachXinwen Zhang, Jaehong Park, Ravi S. Sandhu. 330-343
- Persistent versus Dynamic Role MembershipJean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody. 344-357
- FlexFlow: A Flexible Flow Control Policy Specification FrameworkShiping Chen, Duminda Wijesekera, Sushil Jajodia. 358-371
- Data and Applications Security: Past, Present and the FutureBhavani M. Thuraisingham. 375-390
- Digital Forensics: Operational, Legal, and Research IssuesMark Pollitt, Michael Caloyannides, Jon Novotny, Sujeet Shenoi. 393-403