Abstract is missing.
- The Effective Implementation of Information Security in OrganizationsO. A. Hoppe, Johan Van Niekerk, Rossouw von Solms. 1-18
- A Practical Approach to Information Security Awareness in the OrganizationCheryl Vroom, Rossouw von Solms. 19-38
- RBAC Policies in XML for X.509 Based Privilege ManagementDavid W. Chadwick, Alexander Otenko. 39-54
- A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit ConfigurationAftab Ahmad, Tobias Ruighaver. 55-66
- Elaborating Quantitative Approaches for IT Security EvaluationDimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos. 67-78
- A Security Evaluation Criteria for Baseline Security StandardsW. J. Brooks, Matthew J. Warren, William Hutchinson. 79-90
- Maturity Criteria for Developing Secure IS and SW: Limits, and ProspectsMikko T. Siponen. 91-108
- For a Secure Mobile IP and Mobile IPv6 DeploymentMaryline Laurent-Maknavicius. 109-120
- Addressing Internet Security Vulnerabilities: A Benchmarking StudyA. Alayed, Steven Furnell, I. M. Barlow. 121-132
- The Threat From Within -An Analysis of Attacks on anInternal NetworkJohn Haggerty, Qi Shi, Madjid Merabti. 133-146
- Security Vulnerabilities in Event-Driven SystemsSimeon Xenitellis. 147-160
- Denial of Service: Another ExampleJ. J. Yan. 161-170
- A Detection Scheme for the SK VirusD. Salah, Heba Kamal Aslan, Mahmoud T. El-Hadidi. 171-182
- An Information Security Curriculum in FinlandTeemupekka Virtanen, Ronja Addams-Moring. 183-190
- Information Security Culture: The Socio-Cultural Dimension in Information Security ManagementThomas Schlienger, Stephanie Teufel. 191-202
- Information Security CultureA. Martins, Jan H. P. Eloff. 203-214
- Keystroke Analysis as a Method of Advanced User Authentication and ResponsePaul Dowland, Steven Furnell, Maria Papadaki. 215-226
- Zero Knowledge Broadcasting Identification SchemeMagdi M. S. El-Soudani, H. S. El-Refaey, H. M. Mourad. 227-238
- A New End-to-End Authentication Protocol for Mobile Users to Access Internet ServicesLi-Sha He, Ning Zhang, Li-Rong He. 239-250
- Mandatory Security Policies for CORBA Security ModelCarla Merkle Westphall, Joni da Silva Fraga, Carlos Becker Westphall, S. C. S. Bianchi. 251-262
- Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA SecurityCarla Merkle Westphall, Joni da Silva Fraga, Michelle S. Wangham, Rafael R. Obelheiro, Lau Cheuk Lung. 263-274
- Secure Database Connectivity on the WWWMarijke Coetzee, Jan H. P. Eloff. 275-286
- Towards Semantic Integrity in Rational DatabasesReinhardt A. Botha. 287-298
- Formal Design of Packet Filtering SystemsG. Osman, M. G. Darwish, M. Zaki. 299-310
- Elliptic Curve Cryptosystems on Smart CardsE. Mohammed, A. Emarah, Kh. El-Shennawy. 311-322
- Establishing Bilateral Anonymous Communication in Open NetworksT. Demuth. 323-334
- BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent BusinessChrister Magnusson, Louise Yngström. 335-346
- Information Systems Security and the Information Systems Development Project: Towards a Framework for Their IntegrationTheodore Tryfonas, Evangelos A. Kiountouzis. 347-356
- An Efficient Hybrid Sealed Bid Auction ProtocolR. Abdel-Moneim, S. El-Kassas, H. Hosny. 357-372
- Self-Determination in Mobile Internet: PiMI Prototype ResultsSimone Fischer-Hübner, M. Nilsson, Helena Lindskog. 373-386
- Secure Component Distribution Using WebComSimon N. Foley, Thomas B. Quillinan, John P. Morrison. 387-398
- E-Ticket Issuing System with 3-D Pattern Recognition for Mobile TerminalsRyuya Uda, Masahito Ito, Kohei Awaya, Hiroshi Shigeno, Yutaka Matsushita. 399-410
- An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce TransactionsD. Critchlow, Ning Zhang. 411-422
- Secure Selective Exclusion in Ad Hoc Wireless NetworkRoberto Di Pietro, Luigi V. Mancini, Sushil Jajodia. 423-434
- Optical Network Models for Quantum CryptographyS. T. Faraj, F. Al-Naima, S. Y. Ameen. 435-452
- A Unified Regulatory Framework on a European Information Society: Suggested Building LevelsPanagiotes S. Anastasiades. 453-468
- Revisiting Legal and Regulatory Requirements for Secure E-VotingL. Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas. 469-480
- A Security Incident Data ModelMeletis A. Belsis, Anthony N. Godwin, Leonid Smalov. 481-494
- Security Levels for Contracting AgentsA. Meier, Susanne Röhrig. 495-506
- Functional Requirements for a Secure Electronic Voting SystemS. Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou. 507-520
- Intelligent IP Packet FilteringM. Hashem, A. Mohamed, M. Wahib. 521-535
- Human Computer Interaction: An Information Security PerspectivesMariki M. Eloff, Jan H. P. Eloff. 535-546
- A Very Smart Card for Fighting Against TerrorismJ. Geneste. 547-558
- SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack SignaturesMichael Meier, Niels Bischof, Thomas Holz. 559-572
- Propagating Modifications to Mobile PoliciesKenneth Smith, Donald B. Faatz, Amgad Fayad, Sushil Jajodia. 573-584