Abstract is missing.
- Self-managed Cells for Ubiquitous SystemsNaranker Dulay, Emil C. Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Steven Heeps. 1-6 [doi]
- Critical Information Assurance Challenges for Modern Large-Scale InfrastructuresMing-Yuh Huang. 7-22 [doi]
- Rule-Based Topological Vulnerability AnalysisVipin Swarup, Sushil Jajodia, Joseph Pamula. 23-37 [doi]
- Models and Analysis of Active Worm DefenseDavid M. Nicol, Michael Liljenstam. 38-53 [doi]
- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer CodesDouglas H. Summerville, Victor A. Skormin, Alexander Volynkin, James Moronski. 54-75 [doi]
- Calibrating Entropy Functions Applied to Computer NetworksDuncan A. Buell. 76-87 [doi]
- A Passive External Web Surveillance Technique for Private NetworksConstantine Daicos, Scott Knight. 88-103 [doi]
- A Secure Way to Combine IPsec, NAT & DHCPJacques Demerjian, Ibrahim Hajjeh, Mohamad Badra, Salim Ferraz. 104-118 [doi]
- A Generic Model for Analyzing Security ProtocolsYonggen Gu, Yuxi Fu, Farong Zhong, Han Zhu. 119-128 [doi]
- Networks, Markov Lie Monoids, and Generalized EntropyJoseph E. Johnson. 129-135 [doi]
- Trust by Workflow in Autonomic CommunicationMikhail I. Smirnov. 136-150 [doi]
- An Ontology-Based Approach to Information Systems Security ManagementBill Tsoumas, Stelios Dritsas, Dimitris Gritzalis. 151-164 [doi]
- Safety Problems in Access Control with Temporal ConstraintsPhilippe Balbiani, Fahima Cheikh. 165-178 [doi]
- A Modal Logic for Role-Based Access ControlThumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin. 179-193 [doi]
- Unique User-Generated Digital PseudonymsPeter Schartner, Martin Schaffer. 194-205 [doi]
- A Probabilistic Property-Specific Approach to Information FlowDanièle Beauquier, Marie Duflot, Marius Minea. 206-220 [doi]
- Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for AutomataRoberto Giacobazzi, Isabella Mastroeni. 221-234 [doi]
- Detection of Illegal Information FlowAlexander Grusho, Alexander Kniazev, Elena Timonina. 235-244 [doi]
- Towards More Controllable and Practical DelegationGang Yin, Huaimin Wang, Dian-xi Shi, Haiya Gu. 245-258 [doi]
- Policy-Driven Routing Management Using CIMFélix J. García Clemente, Jesús D. Jiménez Re, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. 259-271 [doi]
- Secure Hybrid Operating System Linux over Fenix Dmitry P. Zegzhda, Alex M. Vovk. 272-285 [doi]
- A Formal Description of SECIMOS Operating SystemZhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He. 286-297 [doi]
- A Theoretical Model for the Average Impact of Attacks on Billing InfrastructuresFabrizio Baiardi, Claudio Telmon. 298-310 [doi]
- Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life CycleIgor V. Kotenko, Mikhail Stepashkin. 311-324 [doi]
- A Temporal Logic-Based Model for Forensic Investigation in Networked System SecuritySlim Rekhis, Noureddine Boudriga. 325-338 [doi]
- Vulnerabilities Detection in the Configurations of MS Windows Operating SystemPeter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin. 339-351 [doi]
- Hybrid Intrusion Detection Model Based on Ordered SequencesAbdulrahman Alharby, Hideki Imai. 352-365 [doi]
- Asynchronous Alert Correlation in Multi-agent Intrusion Detection SystemsVladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov. 366-379 [doi]
- Behavior-Based Model of Detection and Prevention of Intrusions in Computer NetworksVictor Serdiouk. 380-393 [doi]
- A Formal Immune Network and Its Implementation for On-line Intrusion DetectionAlexander O. Tarakanov, Sergei V. Kvachev, Alexander V. Sukhorukov. 394-405 [doi]
- Foundation for a Time Interval Access Control ModelFrancis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen. 406-411 [doi]
- Developing an Insider Threat Model Using Functional DecompositionJonathan W. Butts, Robert F. Mills, Rusty O. Baldwin. 412-417 [doi]
- An XML-Seamless Policy Based Management FrameworkFélix J. García Clemente, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. 418-423 [doi]
- Statistical Covert Channels Through PROXY ServerAlexei Galatenko, Alexander Grusho, Alexander Kniazev, Elena Timonina. 424-429 [doi]
- Encoding Private Key in FingerprintErnö Jeges, Zoltán Hornák, Csaba Körmöczi. 430-435 [doi]
- A New Scheme for the Location Information Protection in Mobile Communication EnvironmentsSoon Seok Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim. 436-441 [doi]
- Region Protection/Restoration Scheme in Survivable NetworksWojciech Molisz, Jacek Rak. 442-447 [doi]
- Massive Data Mining for Polymorphic Code DetectionUdo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger. 448-453 [doi]
- Key Escrow with Tree-Based Access StructureMartin Schaffer, Peter Schartner. 454-459 [doi]
- Security Checker Architecture for Policy-Based Security ManagementArtem Tishkov, Igor V. Kotenko, Ekaterina Sidelnikova. 460-465 [doi]
- An Efficient Access Control Model Utilized the Attribute Certificate StructuringSoomi Yang. 466-471 [doi]
- Secure Protected Password Change SchemeEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. 472-477 [doi]