Abstract is missing.
- Generating policy based security implementation in enterprise network: a formal frameworkPadmalochan Bera, Soumya Maity, Soumya Kanti Ghosh. 1-8 [doi]
- Cue: a framework for generating meaningful feedback in XACMLSunil Kumar Ghai, Prateek Nigam, Ponnurangam Kumaraguru. 9-16 [doi]
- FAME: a firewall anomaly management environmentHongxin Hu, Gail-Joon Ahn, Ketan Kulkarni. 17-26 [doi]
- Management of heterogeneous security access control configuration using an ontology engineering approachWilliam M. Fitzgerald, Simon N. Foley. 27-36 [doi]
- FlowChecker: configuration analysis and verification of federated openflow infrastructuresEhab Al-Shaer, Saeed Al-Haj. 37-44 [doi]
- A declarative approach for secure and robust routingPalanivel A. Kodeswaran, Anupam Joshi, Timothy W. Finin, Filip Perich. 45-52 [doi]
- It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewallsFahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, Kellogg S. Booth. 53-62 [doi]
- Towards an integrated approach to role engineeringChris Giblin, Marcel Graf, Günter Karjoth, Andreas Wespi, Ian Molloy, Jorge Lobo, Seraphin B. Calo. 63-70 [doi]
- Cost-aware systemwide intrusion defense via online forensics and on-demand detector deploymentSaman A. Zonouz, Kaustubh R. Joshi, William H. Sanders. 71-74 [doi]
- Cut me some securityDivya Muthukumaran, Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger. 75-78 [doi]
- Authorizing and directing configuration updates in contemporary it infrastructuresBart Van Brabant, Thomas Delaet, Wouter Joosen. 79-82 [doi]
- Dynamic cross domain information sharing: a concept paper on flexible adaptive policy managementMichael Atighetchi, Jonathan Webb, Partha Pratim Pal, Joseph P. Loyall, Azer Bestavros, Michael J. Mayhew. 83-88 [doi]