Abstract is missing.
- Dynamic Meta-level Access Control in SQLSteve Barker. 1-16 [doi]
- On the Formal Analysis of a Spatio-temporal Role-Based Access Control ModelManachai Toahchoodee, Indrakshi Ray. 17-32 [doi]
- A Unified Audit Expression Model for Auditing SQL QueriesVikram Goyal, Shyam K. Gupta, Anand Gupta. 33-47 [doi]
- A New Approach to Secure LoggingDi Ma, Gene Tsudik. 48-63 [doi]
- Security, Functionality and Scale?Ross Anderson. 64 [doi]
- P4A: A New Privacy Model for XMLAngela Cristina Duta, Ken Barker. 65-80 [doi]
- Privacy-Aware Collaborative Access Control in Web-Based Social NetworksBarbara Carminati, Elena Ferrari. 81-96 [doi]
- A Privacy-Preserving Ticketing SystemKristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe. 97-112 [doi]
- The Analysis of Windows Vista Disk Encryption AlgorithmMohamed Abo El-Fotouh, Klaus Diepold. 113-126 [doi]
- Shared and Searchable Encrypted Data for Untrusted ServersChangyu Dong, Giovanni Russello, Naranker Dulay. 127-143 [doi]
- Secure Construction of Contingency Tables from Distributed DataHaibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam. 144-157 [doi]
- Web Services Security: Techniques and Challenges (Extended Abstract)Anoop Singhal. 158 [doi]
- Empirical Analysis of Certificate Revocation ListsDaryl Walleck, Yingjiu Li, Shouhuai Xu. 159-174 [doi]
- Using New Tools for Certificate Repositories Generation in MANETsCandelaria Hernández-Goya, Pino Caballero-Gil, Oscar Delgado-Mohatar, Jezabel Molina-Gil, Cándido Caballero-Gil. 175-189 [doi]
- Exclusive Strategy for Generalization Algorithms in Micro-data DisclosureLei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky. 190-204 [doi]
- Protecting the Publishing Identity in Multiple TuplesYoudong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang. 205-218 [doi]
- Panel Session: What Are the Key Challenges in Distributed Security?Steve Barker, David Chadwick, Jason Crampton, Emil Lupu, Bhavani M. Thuraisingham. 219-221 [doi]
- On the Applicability of Trusted Computing in Distributed Authorization Using Web ServicesAarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora. 222-237 [doi]
- Sharing but Protecting Content Against Internal Leakage for OrganisationsMuntaha Alawneh, Imad M. Abbadi. 238-253 [doi]
- Regulating Exceptions in Healthcare Using Policy SpacesClaudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati. 254-267 [doi]
- Towards Automation of Testing High-Level Security PropertiesAiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad Debbabi. 268-282 [doi]
- An Attack Graph-Based Probabilistic Security MetricLingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia. 283-296 [doi]
- An Opinion Model for Evaluating Malicious Activities in Pervasive Computing SystemsIndrajit Ray, Nayot Poolsappasit, Rinku Dewri. 297-312 [doi]
- DIWeDa - Detecting Intrusions in Web DatabasesAlex Roichman, Ehud Gudes. 313-329 [doi]
- Securing Workflows with XACML, RDF and BPELVijayant Dhankhar, Saket Kaushik, Duminda Wijesekera. 330-345 [doi]