Abstract is missing.
- MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-CommerceScott Buffett, Luc Comeau, Michael W. Fleming, Bruce Spencer. [doi]
- A Practical Buses Protocol for Anonymous Internet CommunicationAndreas Hirt, Michael J. Jacobson Jr., Carey L. Williamson. [doi]
- Link-Time Enforcement of Confined Types for JVM BytecodePhilip W. L. Fong. [doi]
- Network Intrusion Detection using Random ForestsJiong Zhang, Mohammad Zulkernine. [doi]
- Providing Personalized Privacy Support in Public PlacesCarsten Roecker. [doi]
- Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99Hilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood. [doi]
- Security Analysis of Wireless JavaMourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua. [doi]
- Electronic Voting in the UK: Current Trends in Deployment , Requirements and TechnologiesTim Storer, Ishbel Duncan. [doi]
- Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq DatabasesFrédéric Massicotte, Mathieu Couture, Yvan Labiche. [doi]
- MozPETs - a privacy enhanced Web BrowserLars Brückner, Marco Voss. [doi]
- The Advisor-POMDP: A Principled Approach to Trust through Reputation in Electronic MarketsKevin Regan, Robin Cohen, Pascal Poupart. [doi]
- Graphical and Digital signature Combination for fulfilling the cultural gap between traditional signature and current smart card digital certificate/signatureNazar Elfadil. [doi]
- User Perceptions of Privacy and Security on the WebScott Flinn, Jo Lumsden. [doi]
- Trustworthiness Measure for e-ServiceElizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon. [doi]
- Public Trust and Electronic Health RecordsMike Smit, Michael McAllister, Jacob Slonim. [doi]
- Detecting Computer Intrusions Using Behavioral BiometricsAhmed Awad E. Ahmed, Issa Traoré. [doi]
- Solitary Confinement: Using Artificial Cells to Control Access and Facilitate Apoptosis in Computer SystemsJeff Gilchrist. [doi]
- Towards a Privacy Access Control Model for e-Healthcare ServicesPatrick C. K. Hung. [doi]
- PEEP- Privacy Enforcement in Email ProjectNarjès Boufaden, William Elazmeh, Stan Matwin, Nathalie Japkowicz. [doi]
- SHEMP: Secure Hardware Enhanced MyProxyJohn Marchesini, Sean W. Smith. [doi]
- Credential Networks: a General Model for Distributed Trust and Authenticity ManagementJacek Jonczy, Rolf Haenni. [doi]
- Information Visualization for Intrusion DetectionJames Blustein, Daniel L. Silver, Ching-Lung Fu. [doi]
- Generic Reliability Trust ModelGlenn Mahoney, Wendy J. Myrvold, Gholamali C. Shoja. [doi]
- Specifying Personal Privacy Policies to Avoid Unexpected OutcomesGeorge Yee, Larry Korba. [doi]
- Enforcing Privacy in Web ApplicationsAriel Futoransky, Ariel Waissbein. [doi]
- A Privacy Preserving Enhanced Trust Building Mechanism for Web ServicesZhengping Wu, Alfred C. Weaver. [doi]
- Towards Eliminating Steganographic CommunicationAnthony Whitehead. [doi]
- Ubiquitous Redirection as Access Control ResponseGeorge Bakos, Sergey Bratus. [doi]
- Usable Firewall ConfigurationWeiwei Geng, Scott Flinn, John M. DeDourek. [doi]
- Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems?Stephen Neville. [doi]
- How to Calculate the Information PrivacySabah S. Al-Fedaghi. 3-13 [doi]