Abstract is missing.
- Computerized Voting Machines: A View from the TrenchesBarbara Simons. 1-2 [doi]
- XML Access Control with Policy Matching TreeNaizhen Qi, Michiharu Kudo. 3-23 [doi]
- Semantic Access Control Model: A Formal SpecificationMariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana. 24-43 [doi]
- A Generic XACML Based Declarative Authorization Scheme for JavaRajeev Gupta, Manish Bhide. 44-63 [doi]
- Specification and Validation of Authorisation Constraints Using UML and OCLKarsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge. 64-79 [doi]
- Unified Index for Mobile Object Data and AuthorizationsVijayalakshmi Atluri, Qi Guo. 80-97 [doi]
- On ObligationsManuel Hilty, David A. Basin, Alexander Pretschner. 98-117 [doi]
- A Practical Voter-Verifiable Election SchemeDavid Chaum, Peter Y. A. Ryan, Steve A. Schneider. 118-139 [doi]
- Machine-Checked Security Proofs of Cryptographic Signature SchemesSabrina Tarento. 140-158 [doi]
- Sanitizable SignaturesGiuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik. 159-177 [doi]
- Limits of the Cryptographic Realization of Dolev-Yao-Style XORMichael Backes, Birgit Pfitzmann. 178-196 [doi]
- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case StudyAslan Askarov, Andrei Sabelfeld. 197-221 [doi]
- Augmented Oblivious Polynomial Evaluation Protocol and Its ApplicationsHuafei Zhu, Feng Bao. 222-230 [doi]
- Using Attack Trees to Identify Malicious Attacks from Authorized InsidersIndrajit Ray, Nayot Poolsapassit. 231-246 [doi]
- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion AlertsLingyu Wang, Anyi Liu, Sushil Jajodia. 247-266 [doi]
- Towards a Theory of Intrusion DetectionGiovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade. 267-286 [doi]
- On Scalability and Modularisation in the Modelling of Network Security SystemsJoão Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus. 287-304 [doi]
- Sybil-Resistant DHT RoutingGeorge Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson. 305-318 [doi]
- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service AttacksFelix C. Freiling, Thorsten Holz, Georg Wicherski. 319-335 [doi]
- Quantifying Probabilistic Information Flow in Computational Reactive SystemsMichael Backes. 336-354 [doi]
- Enforcing Non-safety Security Policies with Program MonitorsJay Ligatti, Lujo Bauer, David Walker. 355-373 [doi]
- Soundness of Formal Encryption in the Presence of Key-CyclesPedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov. 374-396 [doi]
- Privacy Preserving ClusteringSomesh Jha, Louis Kruger, Patrick McDaniel. 397-417 [doi]
- Abstractions Preserving Parameter ConfidentialitySigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph. 418-437 [doi]
- Minimal Disclosure in Hierarchical Hippocratic Databases with DelegationFabio Massacci, John Mylopoulos, Nicola Zannone. 438-454 [doi]
- Security Notions for Disk EncryptionKristian Gjøsteen. 455-474 [doi]
- Local View Attack on Anonymous CommunicationMarcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski. 475-488 [doi]
- Browser Model for Security Analysis of Browser-Based ProtocolsThomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi. 489-508 [doi]