Abstract is missing.
- Creating Objects in the Flexible Authorization FrameworkNicola Zannone, Sushil Jajodia, Duminda Wijesekera. 1-14 [doi]
- Detection and Resolution of Anomalies in Firewall Policy RulesMuhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham. 15-29 [doi]
- On Finding an Inference-Proof Complete Database for Controlled Query EvaluationJoachim Biskup, Lena Wiese. 30-43 [doi]
- Consolidating the Access Control of Composite Applications and WorkflowsMartin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz. 44-59 [doi]
- Authenticating Multi-dimensional Query Results in Data PublishingWeiwei Cheng, HweeHwa Pang, Kian-Lee Tan. 60-73 [doi]
- XML Streams WatermarkingJulien Lafaye, David Gross-Amblard. 74-88 [doi]
- Aggregation Queries in the Database-As-a-Service ModelEinar Mykletun, Gene Tsudik. 89-103 [doi]
- Policy Classes and Query Rewriting Algorithm for XML Security ViewsNataliya Rassadko. 104-118 [doi]
- Interactive Analysis of Attack Graphs Using Relational QueriesLingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia. 119-132 [doi]
- Notarized Federated Identity Management for Web ServicesMichael T. Goodrich, Roberto Tamassia, Danfeng Yao. 133-147 [doi]
- Resolving Information Flow Conflicts in RBAC SystemsNoa Tuval, Ehud Gudes. 148-162 [doi]
- Policy Transformations for Preventing Leakage of Sensitive Information in Email SystemsSaket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann. 163-178 [doi]
- Term Rewriting for Access ControlSteve Barker, Maribel Fernández. 179-193 [doi]
- Discretionary and Mandatory Controls for Role-Based AdministrationJason Crampton. 194-208 [doi]
- A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented ApproachRavi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari. 209-223 [doi]
- Enhancing User Privacy Through Data Handling PoliciesClaudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati. 224-236 [doi]
- Efficient Enforcement of Security Policies Based on Tracking of Mobile UsersVijayalakshmi Atluri, Heechang Shin. 237-251 [doi]
- A Framework for Flexible Access Control in Digital Library SystemsIndrajit Ray, Sudip Chakraborty. 252-266 [doi]
- Authrule: A Generic Rule-Based Authorization ModuleSönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe. 267-281 [doi]
- Aspect-Oriented Risk Driven Development of Secure ApplicationsGeri Georg, Siv Hilde Houmb, Indrakshi Ray. 282-296 [doi]
- From Business Process Choreography to Authorization PoliciesPhilip Robinson, Florian Kerschbaum, Andreas Schaad. 297-309 [doi]
- Information Theoretical Analysis of Two-Party Secret ComputationDa-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu. 310-317 [doi]