Abstract is missing.
- Security Protocols: Principles and CalculiMartín Abadi. 1-23 [doi]
- Secure Service OrchestrationMassimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari, Roberto Zunino. 24-74 [doi]
- IT Security Analysis Best Practices and Formal ApproachesDaniel Le Métayer. 75-91 [doi]
- Low-Level Software Security: Attacks and DefensesÚlfar Erlingsson. 92-134 [doi]
- Enhancing Java Security with History Based Access ControlFabio Martinelli, Paolo Mori. 135-159 [doi]
- On the Protection and Technologies of Critical Information InfrastructuresJavier Lopez, Cristina Alcaraz, Rodrigo Roman. 160-182 [doi]
- An Interpretation of Identity-Based CryptographyLiqun Chen. 183-208 [doi]
- Trust and Reputation SystemsAudun Jøsang. 209-245 [doi]
- An Introduction to the Role Based Trust Management Framework RTMarcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough. 246-281 [doi]
- Trusted Mobile PlatformsEimear Gallery, Chris J. Mitchell. 282-323 [doi]