Abstract is missing.
- A Goal-Oriented Approach for Mitigating Security and Continuity RisksJane Cleland-Huang, Mark Denne, Ghazy Mahjub, Nilesh Patel.
- Using Common Criteria Methodology to Express Informal Security RequirementsThuy D. Nguyen, Cynthia E. Irvine, Douglas R. Kane Jr..
- Measurement to Support Secure Software EngineeringNadya Bartol, Booz Allen Hamilton, Joe Jarzombek, Cheryl L. Jones, Jim McCurley, John Murdoch.
- Simplifying Client-Server Application Development with Secure Reusable ComponentsYngve Espelid, Lars-Helge Netland, Khalid A. Mughal, Kjell Jørgen Hole.
- A Methodical Defense against TOCTTOU Attacks: The EDGI ApproachCalton Pu, Jinpeng Wei.
- Two Demonstrations of Economical EAL5+ Development for TokeneerJohn Anton, Martin Croxford, Alessandro Coglio, Janet Barnes, Randy Johnson, Tim Kremann.
- Safe Java Native InterfaceGang Tan, Andrew W. Appel, Srimat Chakradhar, Anand Raghunathan, Srivaths Ravi 0001, Daniel C. Wang.
- Why Johnny Can Hack: The Mismatch between Vulnerabilities and Security Protection StandardsSuvda Myagmar, William Yurcik.
- Engineering the Tokeneer Enclave Protection SoftwareJanet Barnes, Rod Chapman, Randy Johnson, James C. Widmaier, Bill Everett, David Cooper.
- Dynamic Intransitive NoninterferenceRebekah Leslie.
- Resource Bound Safety in Grid ComputingJianliang Yi, Weijiang Yu, Aloysius K. Mok.
- Using Code Normalization for Fighting Self-Mutating MalwareDanilo Bruschi, Lorenzo Martignoni, Mattia Monga.
- Developing Secure Web-Based ApplicationsToan Huynh, James Miller 0001.
- UML-Based Modeling and Formal Verification of Authentication ProtocolsBenjamin Fontan, Sara Mota, Thierry Villemur, Pierre de Saqui-Sannes, Jean-Pierre Courtiat.
- Information Flow Control for Java Based on Path Conditions in Dependence GraphsChristian Hammer 0001, Jens Krinke, Gregor Snelting.
- A Formal Framework for Secure Design and Constraint Checking in UMLThuong Doan, Laurent Michel, Steven A. Demurjian.
- Chicken & Egg: Dependencies in Security Testing and Compliance with Common Criteria EvaluationsAmit M. Paradkar, Suzanne McIntosh, Sam Weber, David C. Toll, Paul A. Karger, Matt Kaplan 0003.
- Using SPARK-Ada to Model and Verify a MILS Message RouterBryan Rossebo, Paul W. Oman, Jim Alves-Foss, Ryan Blue, Paul Jaszkowiak.
- A Classification of SQL Injection Attacks and CountermeasuresWilliam G. J. Halfond, Jeremy Viegas, Alessandro Orso.