Abstract is missing.
- Signature and Access Control Policies for XML DocumentsElisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza. 1-22 [doi]
- Authorization and Access Control in Adaptive WorkflowsDulce Domingos, António Rito Silva, Pedro Veiga. 23-38 [doi]
- Flexible Regulation of Distributed CoalitionsXuhui Ao, Naftaly H. Minsky. 39-60 [doi]
- Initiator-Resilient Universally Composable Key ExchangeDennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt. 61-84 [doi]
- Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processingYuji Watanabe, Masayuki Numao. 85-99 [doi]
- Precisely Answering Multi-dimensional Range Queries without Privacy BreachesLingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia. 100-115 [doi]
- Passive Attack Analysis for Connection-Based Anonymity SystemsAndrei Serjantov, Peter Sewell. 116-131 [doi]
- Rapid Mixing and Security of Chaum s Visual Electronic VotingMarcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski. 132-145 [doi]
- Towards Accountable Management of Privacy and Identity InformationMarco Casassa Mont, Siani Pearson, Pete Bramhall. 146-161 [doi]
- A Toolkit for Managing Enterprise Privacy PoliciesMichael Backes, Birgit Pfitzmann, Matthias Schunter. 162-180 [doi]
- Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart CardHelmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll. 181-200 [doi]
- Hardware Encapsulation of Security ServicesAdrian Baldwin, Simon Shiu. 201-216 [doi]
- A Formal Security Model of the Infineon SLE 88 Smart Card Memory ManagmentDavid von Oheimb, Georg Walter, Volkmar Lotz. 217-234 [doi]
- Bridging Model-Based and Language-Based SecurityRogardt Heldal, Fredrik Hultin. 235-252 [doi]
- An On-the-Fly Model-Checker for Security Protocol AnalysisDavid A. Basin, Sebastian Mödersheim, Luca Viganò. 253-270 [doi]
- Symmetric Authentication within a Simulatable Cryptographic LibraryMichael Backes, Birgit Pfitzmann, Michael Waidner. 271-290 [doi]
- An Improved Reference Flow Control Model for Policy-Based Intrusion DetectionJacob Zimmermann, Ludovic Mé, Christophe Bidan. 291-308 [doi]
- Visualisation for Intrusion DetectionStefan Axelsson. 309-325 [doi]
- On the Detection of Anomalous System Call ArgumentsChristopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna. 326-343 [doi]