Abstract is missing.
- Locality: a new paradigm for thinking about normal behavior and outsider threatJohn McHugh, Carrie Gates. 3-10 [doi]
- Alliance formation for DDoS defenseJelena Mirkovic, Max Robinson, Peter L. Reiher. 11-18 [doi]
- Merging paradigms of survivability and security: stochastic faults and designed faultsJ. McDermott, A. Kim, Judith N. Froscher. 19-25 [doi]
- SELF: a transparent security extension for ELF binariesDaniel C. DuVarney, V. N. Venkatakrishnan, Sandeep Bhatkar. 29-38 [doi]
- Dynamic label binding at run-timeYolanta Beres, Chris I. Dalton. 39-46 [doi]
- Bringing security home: a process for developing secure and usable systemsIvan Flechais, Martina Angela Sasse, Stephen Hailes. 49-57 [doi]
- Security check: a formal yet practical framework for secure software architectureArnab Ray. 59-65 [doi]
- From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verificationMichael Backes, Matthias Schunter. 67-74 [doi]
- Secure object identification: or: solving the Chess Grandmaster ProblemAmmar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi. 77-85 [doi]
- Public key distribution through cryptoIDs Trevor Perrin. 87-102 [doi]
- Owner-controlled informationCarrie Gates, Jacob Slonim. 103-111 [doi]
- Towards a new paradigm for securing wireless sensor networksK. Jones, Ashraf Wadaa, Stephan Olariu, Larry Wilson, Mohamed Eltoweissy. 115-121 [doi]
- Securing nomads: the case for quarantine, examination, and decontaminationKevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher. 123-128 [doi]