Abstract is missing.
- Privacy in the Electronic SocietySabrina De Capitani di Vimercati, Pierangela Samarati. 1-21 [doi]
- A Data Sharing Agreement FrameworkVipin Swarup, Len Seligman, Arnon Rosenthal. 22-36 [doi]
- Password Exhaustion: Predicting the End of Password UsefulnessLuke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger. 37-55 [doi]
- Network Monitoring for Security and ForensicsKulesh Shanmugasundaram, Nasir D. Memon. 56-70 [doi]
- Fairness Strategy for Multilevel Secure Concurrency Control ProtocolNavdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje. 71-85 [doi]
- Optimistic Anonymous Participation in Inter-organizational Workflow InstancesJoachim Biskup, Joerg Parthe. 86-100 [doi]
- O2O: Virtual Private Organizations to Manage Security Policy InteroperabilityFrédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma. 101-115 [doi]
- Privacy Preserving Web-Based EmailKevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick McDaniel. 116-131 [doi]
- Context-Aware Provisional Access ControlAmir Reza Masoumzadeh, Morteza Amini, Rasool Jalili. 132-146 [doi]
- LRBAC: A Location-Aware Role-Based Access Control ModelIndrakshi Ray, Mahendra Kumar, Lijun Yu. 147-161 [doi]
- Extending Context Descriptions in Semantics-Aware Access ControlErnesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati. 162-176 [doi]
- Specification and Realization of Access Control in SPKI/SDSIN. V. Narendra Kumar, R. K. Shyamasundar. 177-193 [doi]
- Design of Key Establishment Protocol Using One-Way Functions to Avert ::::insider-replay:::: AttackMounita Saha, Dipanwita Roy Chowdhury. 194-204 [doi]
- An Efficient Key Assignment Scheme for Access Control in a HierarchyPraveen Kumar Vadnala, Anish Mathuria. 205-219 [doi]
- Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet PeersPurificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa. 220-234 [doi]
- Secure Data Management in Reactive Sensor NetworksL. Chaithanya, M. P. Singh, M. M. Gore. 235-248 [doi]
- Security Ontology: Simulating Threats to Corporate AssetsAndreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl. 249-259 [doi]
- Two-Stage Credit Card Fraud Detection Using Sequence AlignmentAmlan Kundu, Shamik Sural, Arun K. Majumdar. 260-275 [doi]
- New Malicious Code Detection Using Variable Length ::::n::::-gramsD. Krishna Sandeep Reddy, Subrat Kumar Dash, Arun K. Pujari. 276-288 [doi]
- A Dead-Lock Free Self-healing Algorithm for Distributed Transactional ProcessesWanyu Zang, Meng Yu. 289-302 [doi]
- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext AttackHossein Ghodosi. 303-314 [doi]
- A Partial Image Encryption Method with Pseudo Random SequencesY. V. Subba Rao, Abhijit Mitra, S. R. Mahadeva Prasanna. 315-325 [doi]
- High Capacity Lossless Data HidingHyeran Lee, Kyung Hyune Rhee. 326-336 [doi]
- An Implementation and Evaluation of Online Disk Encryption for Windows SystemsVartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan. 337-348 [doi]
- Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract)Haibing Lu, Yingjiu Li, Xintao Wu. 349-352 [doi]
- A Survey of Control-Flow ObfuscationsAnirban Majumdar, Clark D. Thomborson, Stephen Drape. 353-356 [doi]
- Filtering Out Unfair Recommendations for Trust Model in Ubiquitous EnvironmentsWeiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee. 357-360 [doi]
- Secure Itineraries Framework for Mobile Agent SystemsRajwinder Singh, Navdeep Kaur, Anil Kumar Sarje. 361-364 [doi]
- Malafide Intension Based Detection of Privacy Violation in Information SystemShyam K. Gupta, Vikram Goyal, Anand Gupta. 365-368 [doi]
- Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report)Shyam K. Gupta, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta. 369-372 [doi]
- Towards a Formal Specification Method for Enterprise Information System SecurityAnirban Sengupta, Mridul Sankar Barik. 373-376 [doi]
- Recent Research on Privacy Preserving Data MiningAlex Gurevich, Ehud Gudes. 377-380 [doi]