Abstract is missing.
- A Unified Conflict Resolution AlgorithmAmir H. Chinaei, Hamid R. Chinaei, Frank Wm. Tompa. 1-17 [doi]
- Multi-layer Audit of Access RightsBirgit Pfitzmann. 18-32 [doi]
- Refinement for Administrative PoliciesM. A. C. Dekker, Sandro Etalle. 33-46 [doi]
- Authenticating kNN Query Results in Data PublishingWeiwei Cheng, Kian-Lee Tan. 47-63 [doi]
- Query Rewriting Algorithm Evaluation for XML Security ViewsNataliya Rassadko. 64-80 [doi]
- Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric DatabasesAlexander Brodsky, Lei Zhang, Sushil Jajodia. 81-95 [doi]
- Architecture for Data Collection in Database Intrusion Detection SystemsXin Jin, Sylvia L. Osborn. 96-107 [doi]
- Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted DataPeishun Wang, Huaxiong Wang, Josef Pieprzyk. 108-123 [doi]
- Generating Microdata with ::::P:::: -Sensitive ::::K:::: -Anonymity PropertyTraian Marius Truta, Alina Campan, Paul Meyer. 124-141 [doi]
- Preventing Privacy-Invasive Software Using Collaborative Reputation SystemsMartin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén. 142-157 [doi]
- Towards Improved Privacy Policy Coverage in Healthcare Using Policy RefinementRafae Bhatti, Tyrone Grandison. 158-173 [doi]
- Requirements of Secure Storage Systems for Healthcare RecordsRagib Hasan, Marianne Winslett, Radu Sion. 174-180 [doi]
- An Intrusion Detection System for Detecting Phishing AttacksHasika Pamunuwa, Duminda Wijesekera, Csilla Farkas. 181-192 [doi]
- A Three-Dimensional Conceptual Framework for Database PrivacyJosep Domingo-Ferrer. 193-202 [doi]
- Novel RFID Authentication Schemes for Security Enhancement and System EfficiencyN. W. Lo, Kuo-Hui Yeh. 203-212 [doi]