Abstract is missing.
- FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File FingerprintsJohn Haggerty, Mark Taylor. 1-12 [doi]
- Digital Forensic Readiness as a Component of Information Security Best PracticeTalania Grobler, Buks Louwrens. 13-24 [doi]
- Value creation and Return On Security Investments (ROSI)Christer Magnusson, Josef Molvidsson, Sven Zetterqvist. 25-35 [doi]
- Usability and Security of Personal FirewallsAlmut Herzog, Nahid Shahmehri. 37-48 [doi]
- Trusted Ticket Systems and ApplicationsNicolai Kuntze, Andreas U. Schmidt. 49-60 [doi]
- Trust Evaluation for Web Applications based on Behavioral AnalysisLuiz Fernando Rust C. Carmo, Breno G. de Oliveira, Augusto C. Braga. 61-72 [doi]
- Improving the Information Security Model by using TFIRose-Marie Åhlfeldt, Paolo Spagnoletti, Guttorm Sindre. 73-84 [doi]
- Ontological Mapping of Common Criteria s Security Assurance RequirementsAndreas Ekelhart, Stefan Fenz, Gernot Goluch, Edgar R. Weippl. 85-95 [doi]
- Management of Exceptions on Access Control PoliciesJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. 97-108 [doi]
- Security Analysis of Two Ultra-Lightweight RFID Authentication ProtocolsTieyan Li, Guilin Wang. 109-120 [doi]
- Exploratory survey on an Evaluation Model for a Sense of SecurityNatsuko Hikage, Yuko Murayama, Carl Hauser. 121-132 [doi]
- Employees Adherence to Information Security Policies: An Empirical StudyMikko T. Siponen, Seppo Pahnila, Adam Mahmood. 133-144 [doi]
- Phishing in the Wireless: Implementation and AnalysisIvan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens B. Schmitt. 145-156 [doi]
- Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor NetworksTyler Moore, Jolyon Clulow. 157-168 [doi]
- A Credential-Based System for the Anonymous Delegation of RightsLiesje Demuynck, Bart De Decker, Wouter Joosen. 169-180 [doi]
- Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning ContentChristian J. Eibl, Basie von Solms, Sigrid E. Schubert. 181-192 [doi]
- Identity Theft - Empirical evidence from a Phishing ExerciseTjaart Steyn, Hennie A. Kruger, Lynette Drevin. 193-203 [doi]
- A Practical Usability Evaluation of Security Features in End-User ApplicationsSteven Furnell, Dimitris Katsabas, Paul Dowland, Fraser Reid. 205-216 [doi]
- Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural AnalysisA. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff. 217-228 [doi]
- A Survey of Bots Used for Distributed Denial of Service AttacksVrizlynn L. L. Thing, Morris Sloman, Naranker Dulay. 229-240 [doi]
- A Hybrid PKI-IBC Based Ephemerizer SystemSrijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum. 241-252 [doi]
- Keystroke Analysis for Thumb-based Keyboards on Mobile DevicesSevasti Karatzouni, Nathan Clarke. 253-263 [doi]
- Security Remarks on a Convertible Nominative Signature SchemeGuilin Wang, Feng Bao. 265-275 [doi]
- Using Payment Gateways to Maintain Privacy in Secure Electronic TransactionsAlapan Arnab, Andrew Hutchison. 277-288 [doi]
- A Role-Based Architecture for Seamless Identity Management and Effective Task SeparationEvangelos Kotsovinos, Ingo Friese, Martin Kurze, Jörg Heuer. 289-300 [doi]
- Extending Role Based Access Control Model for Distributed Multidomain ApplicationsYuri Demchenko, Leon Gommans, Cees de Laat. 301-312 [doi]
- A Middleware Architecture for Integrating Privacy Preferences and Location AccuracyClaudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. 313-324 [doi]
- Enabling Privacy of Real-Life LBSJan Zibuschka, Lothar Fritsch, Mike Radmacher, Tobias Scherner, Kai Rannenberg. 325-336 [doi]
- Crafting Web Counters into Covert ChannelsXiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang. 337-348 [doi]
- OPA: Onion Policy Administration Model - Another approach to manage rights in DRMThierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia. 349-360 [doi]
- Non-Repudiation in Internet TelephonyNicolai Kuntze, Andreas U. Schmidt, Christian Hett. 361-372 [doi]
- FirePatch: Secure and Time-Critical Dissemination of Software PatchesHåvard D. Johansen, Dag Johansen, Robbert van Renesse. 373-384 [doi]
- An Experimental Evaluation of Multi-Key Strategies for Data OutsourcingErnesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 385-396 [doi]
- Building a Distributed Semantic-aware Security ArchitectureJan Kolter, Rolf Schillinger, Günther Pernul. 397-408 [doi]
- Using Trust to Resist Censorship in the Presence of CollusionAndriy Panchenko, Lexi Pimenidis. 409-420 [doi]
- Evaluating the Effects of Model Generalization on Intrusion Detection PerformanceZhuowei Li, Amitabha Das, Jianying Zhou. 421-432 [doi]
- Modernising MAC: New Forms for Mandatory Access Control in an Era of DRMWilliam J. Caelli. 433-442 [doi]
- Covert Identity Information in Direct Anonymous Attestation (DAA)Carsten Rudolph. 443-448 [doi]
- Safeguarding Personal Data using Rights Management in Distributed ApplicationsAdolf Hohl, Alf Zugenmaier. 449-456 [doi]
- Identification Now and in the Future: Social Grant Distribution Process in South AfricaStephen Flowerday, Gideon Ranga. 457-459 [doi]
- Hard-drive Disposal and Identity FraudPaula Thomas, Theodore Tryfonas. 461-466 [doi]
- An analysis of security and privacy issues relating to RFID enabled ePassportsEleni Kosta, Martin Meints, Marit Hansen, Mark Gasson. 467-472 [doi]
- Toward User Evaluation of IT Security Certification Schemes: A Preliminary FrameworkNicholas Tate, Sharman Lichtenstein, Matthew J. Warren. 473-478 [doi]
- Teaching of Information Security in the Health Care and Nursing Postgraduate programTatjana Welzer, Marko Hölbl, Ana Habjanic, Bostjan Brumen, Marjan Druzovec. 479-484 [doi]
- Remote Virtual Information Assurance NetworkRonald C. Dodge, Corey Bertram, Daniel Ragsdale. 485-490 [doi]
- Certifying the Computer Security Professional Using the Project Management Institute s PMP ModelKara L. Nance, Brian Hay. 491-496 [doi]