Abstract is missing.
- Pythia: Towards Anonymity in AuthenticationDimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos. 1-18
- Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?K. M. Ang, William J. Caelli. 19-34
- Internet Anonymity: Problems and SolutionsClaudia Eckert, A. Pircher. 35-50
- Reducing Certificate Revocating Cost using NPKIAlbert Levi, Çetin Kaya Koç. 51-60
- The Need and Practice of User Authentication and TTP Services in Distributed Health Information SystemsBernd Blobel, Peter Pharow. 61-76
- Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?Constantinos Markantonakis. 77-92
- Modelling Audit Security for Smart-Cart Payment Schemes with UML-SECJan Jürjens. 93-108
- Strong Forward SecurityMike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos. 109-122
- Secret Sharing and Visual Cryptography SchemesAnnalisa De Bonis, Alfredo De Santis. 123-138
- A Two-level Time-Stamping SystemAlban Gabillon, J. Byun. 139-150
- Security Analysis of the Cliques Protocols Suites: First ResultsOlivier Pereira, Jean-Jacques Quisquater. 151-166
- A Secure Workflow System for Dynamic CollaborationJoon S. Park, Myong H. Kang, Judith N. Froscher. 167-182
- On Securely Scheduling a MeetingT. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker. 183-198
- Modeling and Analyzing Separation of Duties in Workflow EnvironmentsKonstantin Knorr, Henrik Stormer. 199-212
- Group Security Association (GSA) Management in IP MulticastThomas Hardjono, Mark Baugher, Hugh Harney. 213-228
- Communication-Efficient Group Key AgreementYongdae Kim, Adrian Perrig, Gene Tsudik. 229-244
- Going Beyond MAC and DAC Using Mobile PoliciesAmgad Fayad, Sushil Jajodia, Donald B. Faatz, Vinti Doshi. 245-260
- An Access Control Model for Data ArchivesPiero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. 261-276
- Checklist-Based Risk Analysis with Evidential ReasoningSungbaek Cho, Zbigniew Ciechanowicz. 277-292
- Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk AnalysisAnn Frisinger. 293-304
- The Security Model to Combine the Corporate and Information SecurityTeemupekka Virtanen. 305-316
- Design Criteria to Classified Information Systems NumericallyTeemupekka Virtanen. 317-326
- Deception: A Tool and Curse for Security ManagementMatthew J. Warren, William Hutchinson. 327-338
- A Methodology to Detect Temporal Regularities in User Behavior for Anomaly DetectionAlexandr Seleznyov. 339-352
- ADeLe: An Attack Description Language for Knowledge-Based Intrusion DetectionC. Michel, Ludovic Mé. 353-368
- Sleepy Watermark Tracing: An Active Network-Based Intrusion Response FrameworkXinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill. 369-384
- An Efficient Software Protection SchemeAntonio Mana, Ernesto Pimentel. 385-402
- Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse ProgramsAdrian Spalka, Armin B. Cremers, Hanno Langweg. 403-420
- Security Concerns for Contemporary Development Practices: A Case StudyTheodore Tryfonas, Evangelos A. Kiountouzis. 421-436
- A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure ISMikko T. Siponen. 437-452
- Redefining Information Systems Security: Viable Information SystemsMaria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis. 453-468
- Extended Description Techniques for Security EngineeringGuido Wimmel, Alexander K. Wißpeintner. 469