Abstract is missing.
- IT Security Certification and Criteria. Progress, Problems and PerspectivesKai Rannenberg. 1-10
- Information Security: Process Evaluation and Product EvaluationMariki M. Eloff, Sebastiaan H. von Solms. 11-18
- Managing Information Security in Healthcare - an Action Research ExperienceHelen L. Armstrong. 19-28
- From Trusted Information Security Controls to a Trusted Information Security EnvironmentRossouw von Solms, Helen van de Haar. 29-36
- A Qualitative Approach to Information AvailabilityTheodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis. 37-48
- A Postgraduate Programme on Information and Communication Systems SecuritySokratis K. Katsikas. 49-58
- Information Security Management Through MeasurementElmarie von Solms, Sebastiaan H. von Solms. 59-68
- The Defense Framework for Large-scale Computer Network SystemJianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng. 69-78
- Identity Mapping: An Approach to Unravel Enterprise Security Management PoliciesWolfgang Eßmayr, Edgar Weippl. 79-88
- Independent Policy Oriented Layering of Security ServicesHerbert Leitold, Peter Lipp, Andreas Sterbenz. 89-98
- Reducing Computer Fraud Through Situational Crime PreventionRobert Willison. 99-109
- Policies for Construction of Information Systems Security Guidelines: Five ApproachesMikko T. Siponen. 111-120
- DNA-proofing for Computer Systems - A New Approach to Computer Security?C. P. Louwrens, Sebastiaan H. von Solms. 121-129
- Using Smart Cards in an Educational Environment: Services and Security FeaturesCostas Lambrinoudakis. 131-140
- MASS: Model for an Auditing Security SystemAlida Liebenberg, Jan H. P. Eloff. 141-150
- Classifying Information for External ReleaseSteven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati. 151-160
- Using Mobile Agent Results to Create Hard-to-Detect Computer VirusesYongge Wang. 161-170
- CARDS: A Distributed System for Detecting Coordinated AttacksJiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia. 171-180
- Robust Audio Watermarking Based on Secure Spread Spectrum and Auditory Perception ModelPetar Horvatic, Jian Zhao, Niels J. Thorwirth. 181-190
- A Simple and Efficient Approach to Verfying Cryptographic ProtocolsSun Yongxing, Wang Xinmei. 191-199
- Power Analysis of RC6 and SerpentWenling Wu, Dengguo Feng, Sihan Qing. 201-209
- A Simple Algorithm for Computing Several Sequences SynthesisWang Mingsheng, Sihan Qing, Dengguo Feng. 211-220
- GSFS - A New Group-Aware Cryptographic File SystemClaudia Eckert, Florian Erhard, Johannes Geiger. 221-230
- Robustness-Agile Encryptor for ATM NetworksHerbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer. 231-240
- Fast Construction of Secure Discrete Logarithm Problems over Jacobian VarietiesJinhui Chao, Kazuto Matsuo, Shigeo Tsujii. 241-250
- A New Serial/Parallel Architecture for a Low Power Modular MultiplierJohann Großschädl. 251-260
- Defending Against Null Calls Stream Attacks by Using a Double-Threshold Dynamic FilterHaizhi Xu, Changwei Cui, Ying Lin, Tiejian Luo, Zhanqiu Dong. 261-270
- A Multi-Party Non-Repudiation ProtocolSteve Kremer, Olivier Markowitch. 271-280
- Analysis and Design of E-voting ProtocolShaoquan Jiang, Dengguo Feng, Sihan Qing. 281-290
- Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents CommunityVladimir I. Gorodetski, Igor V. Kotenko, Victor A. Skormin. 291-300
- Towards Network Denial of Service Resistant ProtocolsJussipekka Leiwo, Tuomas Aura, Pekka Nikander. 301-310
- A Generic Graphical Specification Environment for Security Protocol ModellingElton Saul, Andrew Hutchison. 311-320
- Anonymous Electronic Voting System with Non-Transferable Voting PassesRosanna Y. Chan, Jonathan C. Wong, Alex C. Chan. 321-330
- Improving Packet Filters Management through Automatic and Dynamic SchemesOlivier Paul, Maryline Laurent. 331-340
- A Context-Sensitive Access Control Model and Prototype ImplementationDamian G. Cholewka, Reinhardt A. Botha, Jan H. P. Eloff. 341-350
- Regulating Access To Semistructured Information on the WebErnesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. 351-360
- On the Practical Feasibiltiy of Secure Distributed Computing: A Case StudyGregory Neven, Frank Piessens, Bart De Decker. 361-370
- Elements of a Language for Role-Based Access ControlMichael Hitchens, Vijay Varadharajan. 371-380
- Disallowing Unauthorized State Changes of Distributed Shared ObjectsJussipekka Leiwo, Christoph Hänle, Philip Homburg, Andrew S. Tanenbaum. 381-390
- Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging NetworkIan R. Greenshields, Zhihong Yang. 391-400
- On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive FoundationsMikko T. Siponen. 401-410
- Information Warfare: Fact or Fiction?Matthew J. Warren, William Hutchinson. 411-420
- Enforcing Privacy by Withholding Private InformationFrans A. Lategan, Martin S. Olivier. 421-430
- The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet AgeGregory J. Kirsch, Tim Tingkang Xia. 431-440
- A Framework for Electronic Commerce SecurityLes Labuschagne. 441-450
- Electronic Payment Systems with Fair On-line VerificationFeng Bao, Robert H. Deng, Jianying Zhou. 451-460
- Fair Electronic Cash Systems with Multiple BanksFangguo Zhang, Futai Zhang, YuMin Wang. 461-470
- Securing Mobile Agents for Electronic Commerce: An ExperimentAnthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wong, Michael R. Lyu. 471-480
- A Flexible Management Framework for Certificate Status ValidationAntonio Corradi, Rebecca Montanari, Cesare Stefanelli, Diana Berbecaru, Antonio Lioy, Fabio Maino. 481-490
- A Security Architecture for Electronic Commerce ApplicationsBart De Win, Jan Van den Bergh 0002, Frank Matthijs, Bart De Decker, Wouter Joosen. 491-500
- On the Development of the Advanced Encryption StandardYiqun Lisa Yin. 503-504
- Public Key Infrastructure: Managing the e-Business SecurityXuejia Lai. 505-505