Abstract is missing.
- Streams, Security and ScalabilityTheodore Johnson, S. Muthukrishnan, Oliver Spatscheck, Divesh Srivastava. 1-15 [doi]
- Towards Privacy-Enhanced Authorization Policies and LanguagesClaudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. 16-27 [doi]
- Revocation of Obligation and Authorisation Policy ObjectsAndreas Schaad. 28-39 [doi]
- Role Slices: A Notation for RBAC Permission Assignment and EnforcementJaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting. 40-53 [doi]
- Designing Secure Indexes for Encrypted DatabasesErez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes. 54-68 [doi]
- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted DatabasesJun Li, Edward Omiecinski. 69-83 [doi]
- Verified Query Results from Hybrid Authentication TreesGlen Nuckolls. 84-98 [doi]
- Multilevel Secure Teleconferencing over Public Switched Telephone NetworkInja Youn, Csilla Farkas, Bhavani M. Thuraisingham. 99-113 [doi]
- Secrecy of Two-Party Secure ComputationYi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu. 114-123 [doi]
- Reliable Scheduling of Advanced TransactionsTai Xin, Yajie Zhu, Indrakshi Ray. 124-138 [doi]
- Privacy-Preserving Decision Trees over Vertically Partitioned DataJaideep Vaidya, Chris Clifton. 139-152 [doi]
- Privacy-Preserving Collaborative Association Rule MiningJustin Z. Zhan, Stan Matwin, LiWu Chang. 153-165 [doi]
- Privacy-Preserving Distributed k-AnonymityWei Jiang, Chris Clifton. 166-177 [doi]
- Towards Database FirewallsKun Bai, Hai Wang, Peng Liu. 178-192 [doi]
- Complete Redundancy Detection in FirewallsAlex X. Liu, Mohamed G. Gouda. 193-206 [doi]
- A Comprehensive Approach to Anomaly Detection in Relational DatabasesAdrian Spalka, Jan Lehnhardt. 207-221 [doi]
- An Authorization Architecture for Web ServicesSarath Indrakanti, Vijay Varadharajan. 222-236 [doi]
- Secure Model Management Operations for the WebGuang-Lei Song, Kang Zhang, Bhavani M. Thuraisingham, Jun Kong. 237-251 [doi]
- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic CoalitionsJanice Warner, Vijayalakshmi Atluri, Ravi Mukkamala. 252-266 [doi]
- Secure Mediation with Mobile CodeJoachim Biskup, Barbara Sprick, Lena Wiese. 267-280 [doi]
- Security Vulnerabilities in Software Systems: A Quantitative PerspectiveOmar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray. 281-294 [doi]
- Trading Off Security in a Service Oriented ArchitectureGarret Swart, Benjamin Aziz, Simon N. Foley, John Herbert. 295-309 [doi]
- Trusted Identity and Session Management Using Secure CookiesJoon S. Park, Harish S. Krishnan. 310-324 [doi]
- Security Issues in Querying Encrypted DataMurat Kantarcioglu, Chris Clifton. 325-337 [doi]
- Blind Custodians: A Database Service Architecture That Supports Privacy Without EncryptionAmihai Motro, Francesco Parisi-Presicce. 338-352 [doi]