Abstract is missing.
- An Intelligent Decision Support System for Intrusion Detection and ResponseDipankar Dasgupta, Fabio A. González. 1-14 [doi]
- Mathematical Models of the Covert ChannelsAlexander Grusho. 15-20 [doi]
- Open Issues in Formal Methods for Cryptographic Protocol AnalysisCatherine Meadows. 21 [doi]
- Future Directions in Role-Based Access Control ModelsRavi S. Sandhu. 22-26 [doi]
- Secure Networked ComputingVijay Varadharajan. 27 [doi]
- Composability of SecrecyJan Jürjens. 28-38 [doi]
- Agent-Based Model of Computer Network Security System: A Case StudyVladimir I. Gorodetski, Oleg Karsaev, Alexey Khabalov, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin. 39-50 [doi]
- Security Considerations and Models for Service Creation in Premium IP NetworksMichael Smirnov. 51-62 [doi]
- Secure Systems Design TechnologyPeter D. Zegzhda, Dmitry P. Zegzhda. 63-71 [doi]
- A Privacy-Enhancing e-Business Model Based on InfomediariesDimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis. 72-83 [doi]
- Applying Practical Formal Methods to the Specification and Analysis of Security PropertiesConstance L. Heitmeyer. 84-89 [doi]
- Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ)Andrey Kostogryzov. 90-101 [doi]
- Analyzing Separation of Duties in Petri Net WorkflowsKonstantin Knorr, Harald Weidner. 102-114 [doi]
- Information Security with Formal Immune NetworksAlexander O. Tarakanov. 115-126 [doi]
- BASIS: A Biological Approach to System Information SecurityVictor A. Skormin, José G. Delgado-Frias, Dennis L. McGee, Joseph Giordano, Leonard J. Popyack, Vladimir I. Gorodetski, Alexander O. Tarakanov. 127-142 [doi]
- Learning Temporal Regularities of User Behavior for Anomaly DetectionAlexandr Seleznyov, Oleksiy Mazhelis, Seppo Puuronen. 143-152 [doi]
- Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data MiningHarjit Singh, Steven Furnell, Benn Lines, Paul Dowland. 153-158 [doi]
- Typed MSR: Syntax and ExamplesIliano Cervesato. 159-177 [doi]
- TRBAC: A Temporal Authorization ModelSteve Barker. 178-188 [doi]
- The Set and Function Approach to Modeling Authorization in Distributed SystemsTatyana Ryutov, B. Clifford Neuman. 189-206 [doi]
- Fenix Secure Operating System: Principles, Models and ArchitectureDmitry P. Zegzhda, Pavel G. Stepanov, Alexey D. Otavin. 207-218 [doi]
- Generalized Oblivious Transfer Protocols Based on Noisy ChannelsValeri Korjik, Kirill Morozov. 219-229 [doi]
- Controlled Operations as a Cryptographic PrimitiveBoris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan. 230-241 [doi]
- Key Distribution Protocol Based on Noisy Channel and Error Detecting CodesViktor Yakovlev, Valery Korjik, Alexander Sinuk. 242-250 [doi]
- Dynamic Group Key Management ProtocolGhassan Chaddoud, Isabelle Chrisment, André Schaff. 251-262 [doi]
- SVD-Based Approach to Transparent Embedding Data into Digital ImagesVladimir I. Gorodetski, Leonard J. Popyack, Vladimir Samoilov, Victor A. Skormin. 263-274 [doi]
- Fast Encryption Algorithm Spectr-H64Nick D. Goots, Alexander A. Moldovyan, Nick A. Moldovyan. 275-286 [doi]
- CVS at Work: A Report on New Failures upon Some Cryptographic ProtocolsAntonio Durante, Riccardo Focardi, Roberto Gorrieri. 287-299 [doi]
- On Some Cryptographic Properties of RijndaelSelçuk Kavut, Melek D. Yücel. 300-312 [doi]