Abstract is missing.
- Support for multi-level security policies in DRM architecturesBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum. 3-9 [doi]
- A collaborative approach to autonomic security protocolsHongbin Zhou, Simon N. Foley. 13-21 [doi]
- A qualitative framework for Shannon information theoriesGerard Allwein. 23-31 [doi]
- The user non-acceptance paradigm: INFOSEC s dirty little secretSteven J. Greenwald, Kenneth G. Olthoff, Victor Raskin, Willibald Ruch. 35-43 [doi]
- Towards agile security assuranceKonstantin Beznosov, Philippe Kruchten. 47-54 [doi]
- Information exposure control through data manipulation for ubiquitous computingBoris Dragovic, Jon Crowcroft. 57-64 [doi]
- Property-based attestation for computing platforms: caring about properties, not mechanismsAhmad-Reza Sadeghi, Christian Stüble. 67-77 [doi]
- Symmetric behavior-based trust: a new paradigm for internet computingVivek Haldar, Michael Franz. 79-84 [doi]
- The role of suspicion in model-based intrusion detectionTimothy Hollebeek, Rand Waltzman. 87-94 [doi]
- Omnivore: risk management through bidirectional transparencyScott Flinn, Steve Stoyles. 97-105 [doi]
- Profiling the defendersCarrie Gates, Tara Whalen. 107-114 [doi]