Abstract is missing.
- Authorization and Trust Enhanced Security for Distributed ApplicationsVijay Varadharajan. 1-20 [doi]
- Toward Exploiting Location-Based and Video Information in Negotiated Access Control PoliciesErnesto Damiani, Marco Anisetti, Valerio Bellandi. 21-35 [doi]
- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic BehaviorKevin R. B. Butler, Patrick Drew McDaniel. 36-48 [doi]
- Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT IndustryPrem Chand. 49-65 [doi]
- Auditable Anonymous DelegationBruce Christianson, Partha Das Chowdhury, James A. Malcolm. 66-76 [doi]
- A Robust Double Auction Protocol Based on a Hybrid Trust ModelJungHoon Ha, Jianying Zhou, Sang-Jae Moon. 77-90 [doi]
- VTrust: A Trust Management System Based on a Vector Model of TrustIndrajit Ray, Sudip Chakraborty, Indrakshi Ray. 91-105 [doi]
- Analysis and Modelling of Trust in Distributed Information SystemsWeiliang Zhao, Vijay Varadharajan, George Bryan. 106-119 [doi]
- EPAL Based Privacy Enforcement Using ECA RulesJaijit Bhattacharya, S. K. Gupta. 120-133 [doi]
- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control PoliciesJanice Warner, Vijayalakshmi Atluri, Ravi Mukkamala. 134-147 [doi]
- Protection of Relationships in XML Documents with the XML-BB ModelFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans. 148-163 [doi]
- EISA - An Enterprise Application Security Solution for DatabasesV. Radha, N. Hemanth Kumar. 164-176 [doi]
- Event Detection in Multilevel Secure Active DatabasesIndrakshi Ray, Wei Huang. 177-190 [doi]
- Key Management for Multicast FingerprintingJian Wang, Lein Harn, Hideki Imai. 191-204 [doi]
- A Key Reshuffling Scheme for Wireless Sensor NetworksAshok Kumar Das. 205-216 [doi]
- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless NetworksDebdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita Roy Chowdhury. 217-227 [doi]
- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor NetworksDibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy. 228-238 [doi]
- Detecting ARP Spoofing: An Active TechniqueVivek Ramachandran, Sukumar Nandi. 239-250 [doi]
- Episode Based Masquerade DetectionSubrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari. 251-262 [doi]
- A Game-Theoretic Approach to Credit Card Fraud DetectionVishal Vatsa, Shamik Sural, Arun K. Majumdar. 263-276 [doi]
- Modifications of SHA-0 to Prevent AttacksRoshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury. 277-289 [doi]
- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption SchemesJoongHyo Oh, KyungKeun Lee, Sang-Jae Moon. 290-303 [doi]
- On Broadcast Encryption with Random Key Pre-distribution SchemesMahalingam Ramkumar. 304-316 [doi]
- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field Sharmistha Bagchi-Sen, JinKyu Lee, H. Raghav Rao, Shambhu J. Upadhyaya. 317-321 [doi]
- SPEAR: Design of a Secured Peer-to-Peer Architecture Jaydev Misra, Pinakpani Pal, Aditya Bagchi. 322-327 [doi]
- A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security Anirban Sengupta, Aniruddha Mukhopadhyay, Koel Ray, Aveek Guha Roy, Dipankar Aich, Mridul Sankar Barik, Chandan Mazumdar. 328-331 [doi]
- Development of a Comprehensive Intrusion Detection System - Challenges and ApproachesN. Subramanian, Pramod S. Pawar, Mayank Bhatnagar, Nihar S. Khedekar, Srinivas Guntupalli, N. Satyanarayana, V. K. Vijaykumar, Praveen D. Ampatt, Rajiv Ranjan, Prasad J. Pandit. 332-335 [doi]
- A Transparent End-to-End Security SolutionShince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu. 336-339 [doi]