Abstract is missing.
- Service Dependencies in Information Systems SecurityHervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens. 1-20 [doi]
- Secure Applications without Secure InfrastructuresDieter Gollmann. 21-31 [doi]
- Integrating Types and Specifications for Secure Software DevelopmentGreg Morrisett. 32-35 [doi]
- Cryptography for Network Security: Failures, Successes and ChallengesBart Preneel. 36-54 [doi]
- Group-Centric Models for Secure and Agile Information SharingRavi S. Sandhu, Ram Krishnan, Jianwei Niu, William H. Winsborough. 55-69 [doi]
- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded MicroprocessorsLeonid Domnitser, Nael B. Abu-Ghazaleh, Dmitry Ponomarev. 70-85 [doi]
- Attack and Defense Modeling with BDMPLudovic Pietre-Cambacedes, Marc Bouissou. 86-101 [doi]
- QoS-T: QoS Throttling to Elicit User Cooperation in Computer SystemsVidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat. 102-117 [doi]
- Problems of Modeling in the Analysis of Covert ChannelsAlexander Grusho, Nikolai Grusho, Elena Timonina. 118-124 [doi]
- Policy-Based Design and Verification for Mission AssuranceShiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N. J. Vestal. 125-138 [doi]
- Using Equivalence Relations for Corrective Enforcement of Security PoliciesRaphael Khoury, Nadia Tawbi. 139-154 [doi]
- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient CalculusDevrim Unal, Ozan Akar, M. Ufuk Çaglayan. 155-168 [doi]
- Credentials Management for High-Value TransactionsGlenn S. Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older. 169-182 [doi]
- A New Hard Problem over Non-commutative Finite Groups for Cryptographic ProtocolsDmitriy N. Moldovyan, Nikolay A. Moldovyan. 183-194 [doi]
- Credential Chain Discovery in RT:::T::: Trust Management LanguageKrzysztof Sacha. 195-208 [doi]
- Genetic Optimization of Access Control Schemes in Virtual Local Area NetworksIgor Saenko, Igor V. Kotenko. 209-216 [doi]
- Intellectual Intrusion Detection with Sequences Alignment MethodsYaroslav A. Markov, Maxim O. Kalinin. 217-228 [doi]
- Symptoms-Based Detection of Bot ProcessesJose Andre Morales, Erhan J. Kartaltepe, Shouhuai Xu, Ravi S. Sandhu. 229-241 [doi]
- A Comparison of Feature-Selection Methods for Intrusion DetectionHai Thanh Nguyen, Slobodan Petrovic, Katrin Franke. 242-255 [doi]
- From NLP (Natural Language Processing) to MLP (Machine Language Processing)Peter Teufl, Udo Payer, Guenther Lackner. 256-269 [doi]
- Secure Multi-Agent System for Multi-Hop EnvironmentsStefan Kraxberger, Peter Danner, Daniel M. Hein. 270-283 [doi]
- In the Track of the Agent Protection: A Solution Based on Cryptographic HardwareAntonio Muñoz, Antonio Maña, Pablo Antón. 284-297 [doi]
- Security and Scalability of Remote Entrusting ProtectionVasily Desnitsky, Igor V. Kotenko. 298-306 [doi]
- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM NetworksWojciech Molisz, Jacek Rak. 307-320 [doi]
- Predictive Security Analysis for Event-Driven ProcessesRoland Rieke, Zaharina Stoynova. 321-328 [doi]
- Virtual Environment Security ModelingDmitry P. Zegzhda, Ekaterina Rudina. 329-336 [doi]
- Clarifying Integrity Control at the Trusted Information EnvironmentDmitry P. Zegzhda, Peter D. Zegzhda, Maxim O. Kalinin. 337-344 [doi]