Abstract is missing.
- Trust Mediation for Distributed Information SystemsBrian Toone, Michael Gertz, Premkumar T. Devanbu. 1-12
- Concerning Enterprise Network Vulnerability to HTTP TunnelingConstantine Daicos, Scott Knight. 13-24
- Providing Voice Privacy Over Public Switched Telephone NetworksMohamed Sharif, Duminda Wijesekera. 25-36
- A Multi-Party Non-Repudiation Protocol for Exchange of Different MessagesJose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez. 37-48
- Establishing Chain of Evidence as a Base for Non-Repudiation ServicesJing-Jang Hwang, Min-Hua Shao, Soushan Wu. 49-60
- Securing XML-based Multimedia ContentErnesto Damiani, Sabrina De Capitani di Vimercati. 61-72
- Secure Audit Logging with Tamper-Resistant HardwareCheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel. 73-84
- PCMHoDC. A Scheme to Protect Copyright & Modification History of Digital ContentsHeejae Park, Jong Kim. 85-96
- Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile HandsetsNathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds. 97-108
- Introducing PKI to Enhance Security in Future Mobile NetworksGeorgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis. 109-120
- A Time Driven Methodology for Key Dimensioning in Multicast CommunicationsRoberto Di Pietro, Luigi V. Mancini, Alessandro Mei. 121-132
- A Flexible Category-Based Collusion-Restistant Key Management Scheme for MulticastClaudiu Duma, Nahid Shahmehri, Patrick Lambrix. 133-144
- Content, Context, Process Analysis of IS Security Policy FormationMaria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis. 145-156
- Integrating Security into Systems DevelopmentUlrika Evertsson, Urban Örthberg, Louise Yngström. 157-168
- Integrating Information Security into Corporate GovernanceKerry-Lynn Thomson, Rossouw von Solms. 169-180
- Building an Enterprise IT Security Management SystemMeletis A. Belsis, Leonid Smalov. 181-192
- Information Security Management System: Processes and ProductsMariki M. Eloff, Jan H. P. Eloff. 193-204
- Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier AnalysisScott Knight, Luciano Carosielli. 205-216
- E:::2:::xB: A Domain-Specific String Matching Algorithm for Intrusion DetectionKostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis. 217-228
- Intrusion Masking for Distributed Atomic OperationsMeng Yu, Peng Liu, Wanyu Zang. 229-240
- Using Fuzzy System to Manage False Alarms in Intrusion DetectionMehdi Shajari, Ali A. Ghorbani. 241-252
- An Experiment in Software Decoy DesignJames Bret Michael, Georgios Fragkos, Mikhail Auguston. 253-264
- A User Friendly Guard with Mobile Post-Release Access Control PolicyDouglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle. 265-276
- Security Model for Health Care Computing and Communication SystemsAnas Abou El Kalam, Yves Deswarte. 277-288
- Constrained Role-based DelegationLonghua Zhang, Gail-Joon Ahn. 289-300
- CSAP - An Adaptable Security Module for the E-Government System WebocratFredj Dridi, Michael Fischer, Günther Pernul. 301-312
- Perceptions of Security Contributing to the Implementation of Secure ISTheodore Tryfonas, Evangelos A. Kiountouzis. 313-324
- New Directions on IS Security MethodsMikko T. Siponen. 325-336
- Secure Vickrey Auctions without a Trusted Third PartyBart De Decker, Gregory Neven, Frank Piessens. 337-348
- Integrating Logics and Process Calculi for Cryptographic Protocol AnalysisMauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi. 349-360
- Flexible Delegation Security for Improved Distribution in Ubiquitous EnvironmentsGeorgios Kalogridis, Chan Yeob Yeun, Gary Clemo. 361-372
- Cooperative Defense Firewall ProtocolMagdi M. S. El-Soudani, Mohamed A. Eissa. 373-384
- How to turn a PIN into an Iron BeamStefan Lucks, Rüdiger Weis. 385-396
- World Framework for Security Benchmark ChangesLech J. Janczewski, Andrew M. Colarik. 397-400
- Information Security: Auditing the Behaviour of the EmployeeCheryl Vroom, Rossouw von Solms. 401-404
- Priorities in the Development of Network Intrusion Detection SystemsMarcin Dobrucki, Teemupekka Virtanen. 405-408
- Bridging the Gap between Risk Analysis and Security PoliciesPaul Gaunard, Eric Dubois. 409-412
- Framework and Architecture for Secure Mobile Business ApplicationsJochen Haller, Philip Robinson, Thomas Walter, Roger Kilian-Kehr. 413-416
- ISO 17799 and Australian Healthcare OrganisationsW. J. Brooks, Matthew J. Warren, William Hutchinson. 417-420
- Statistical Disclosure AttacksGeorge Danezis. 421-426
- On the Anonymity of Timed Pool MixesAndrei Serjantov, Richard E. Newman. 427-434
- Privacy in Content Distribution NetworksR. J. Hulsebosch. 435-440
- Security, Fault-Tolerance and their Verification for Ambient SystemsJaap-Henk Hoepman. 441-446
- Hidden Layer Authentication using Smart Card for WEP-based WLANSGiannis Pikrammenos, Ghassan Sarkis, John Soldatos, Vasilios Anagnostopoulos. 447-451
- PINPAS: A Tool for Power Analysis of SmartcardsJerry den Hartog, Jan Verschuren, Erik P. de Vink, Jaap de Vos, W. Wiersma. 453-457
- Assessing Security in Energy-Efficient Sensor NetworksYee Wei Law, Sandro Etalle, Pieter H. Hartel. 459-463
- From Finite State Machines to Provably Correct Java Card AppletsEngelbert Hubbers, Martijn Oostdijk, Erik Poll. 465-470
- Security Characteristics of E-Collaboration EnvironmentsBob Hulsebosch, Ernst-Jan Goedvolk, Wil Janssen. 471-475
- Roadmap for Securing Handheld DevicesPreetida Vinayakray-Jani. 477-482
- Lawful Cyber Decoy PolicyJames Bret Michael, Thomas C. Wingfield. 483-488
- Electronic Signature as a part of Information Society InfrastructureJuhani Paavilainen, Suzana Stojakovic-Celustka, Dagmar Brechlerova. 489-494