Abstract is missing.
- Integration of a Security Product in Service-Oriented ArchitectureAleksander Dikanski, Christian Emig, Sebastian Abeck. 1-7 [doi]
- A Security Pattern for Untraceable Secret HandshakesÁngel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube, Alessandro Sorniotti. 8-14 [doi]
- Comparison of Static Code Analysis ToolsMatti Mantere, Ilkka Uusitalo, Juha Röning. 15-22 [doi]
- Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management ModelKamil Reddy, Hein S. Venter. 23-30 [doi]
- AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID SystemsAlireza Sadighian, Rasool Jalili. 31-36 [doi]
- Secrecy for Bounded Security Protocols without Freshness CheckCatalin V. Birjoveanu. 37-41 [doi]
- Distributed Intrusion Detection: Simulation and Evaluation of Two MethodologiesMauro Migliardi, Valentina Resaz. 42-48 [doi]
- A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation ProofsRüdiger Grimm. 49-56 [doi]
- Quantification of the Effect of Security on Performance in Wireless LANsGh. Rasool Begh, Ajaz Hussain Mir. 57-62 [doi]
- True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client HoneypotsChristian Seifert, Peter Komisarczuk, Ian Welch. 63-69 [doi]
- Security Management with Virtual Gateway PlatformsMario Ibáñez, Natividad Martínez Madrid, Ralf Seepold. 70-75 [doi]
- List of Criteria for a Secure Computer ArchitectureIgor Podebrad, Klaus Hildebrandt, Bernd Klauer. 76-80 [doi]
- Detecting Man-in-the-Middle Attacks by Precise TimingBenjamin Aziz, Geoff W. Hamilton. 81-86 [doi]
- Security Framework for DPWS Compliant DevicesVicente Hernández, Lourdes López, Oscar Prieto, Jose F. Martinez, Ana B. Garcia, Antonio da Silva. 87-92 [doi]
- Multi-level Authentication Scheme Utilizing Smart Cards and BiometricsMucahit Mutlugun, Ibrahim Sogukpinar. 93-98 [doi]
- Towards Proactive Policies Supporting Event-Based Task DelegationKhaled Gaaloul, Philip Miseldine, François Charoy. 99-104 [doi]
- The Process of Engineering of Security of Information Systems (ESIS): The Formalism of Business ProcessesWilson Goudalo, Dominique Seret. 105-113 [doi]
- Enforcement of Security Properties for Dynamic MAC PoliciesJérémy Briffaut, Jean-François Lalande, Christian Toinard, Mathieu Blanc. 114-120 [doi]
- Identification of Basic Measurable Security Components for a Distributed Messaging SystemReijo Savola, Habtamu Abie. 121-128 [doi]
- A Two-Step Execution Mechanism for Thin Secure HypervisorsManabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi. 129-135 [doi]
- Extending Role-Based Access Control for Business UsageHeiko Klarl, Korbinian Molitorisz, Christian Emig, Karsten Klinger, Sebastian Abeck. 136-141 [doi]
- Survivability and Business Continuity Management System According to BS 25999Wolfgang Boehmer. 142-147 [doi]
- Replay Attack of Dynamic Rights within an Authorised DomainImad M. Abbadi, Muntaha Alawneh. 148-154 [doi]
- Criteria for Evaluating the Privacy Protection Level of Identity Management ServicesHyangjin Lee, InKyoung Jeun, Hyuncheol Jung. 155-160 [doi]
- Incorporating Software Security into an Undergraduate Software Engineering CourseCynthia Y. Lester, Frank Jamerson. 161-166 [doi]
- Phishing and Countermeasures in Spanish Online BankingIlkka Uusitalo, Josep M. Catot, Ramon Loureiro. 167-172 [doi]
- Modeling Role-Based Privacy in Social Networking ServicesGabor Gyorgy Gulyas, Róbert Schulcz, Sándor Imre. 173-178 [doi]
- Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware FirewallCristian Varas, Thomas Hirsch. 179-184 [doi]
- A New Approach to Protect the OS from Off-line Attacks Using the Smart CardHossein Rezaei Ghaleh, Shahin Norouzi. 185-190 [doi]
- Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor NetworksRainer Falk, Hans-Joachim Hof. 191-196 [doi]
- Simulating a Multi-domain RFID System for Replacement Part TrackingRainer Falk, Andreas Koepf, Hermann Seuschek, Ming-Yuh Huang, Mingyan Li. 197-202 [doi]
- Security in Ad Hoc Networks: From Vulnerability to Risk ManagementMarianne Azer, Sherif El-Kassas, Magdy M. S. El-Soudani. 203-209 [doi]
- Secure Routing Approach for Unstructured P2P SystemsStefan Kraxberger, Udo Payer. 210-216 [doi]
- Suspicion-Driven Formal Analysis of Security RequirementsNuno Amálio. 217-223 [doi]
- Generation of Role Based Access Control Security Policies for Java Collaborative ApplicationsJérémy Briffaut, X. Kauffmann-Tourkestansky, Jean-François Lalande, Waleed W. Smari. 224-229 [doi]
- Fingerprint Texture Feature for Discrimination and Personal VerificationZahoor Ahmad Jhat, Ajaz Hussain Mir, Simeen Rubab. 230-236 [doi]
- A PIN Entry Scheme Resistant to Recording-Based Shoulder-SurfingPeipei Shi, Bo Zhu, Amr M. Youssef. 237-241 [doi]
- Runtime Protection via Dataflow FlatteningBertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Chit Wei Saw. 242-248 [doi]
- Personalized Filtering of Polymorphic E-mail SpamMasaru Takesue. 249-254 [doi]
- On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor NetworksVasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou. 255-261 [doi]
- A Threat Analysis Methodology for Security Evaluation and Enhancement PlanningAntonietta Stango, Neeli R. Prasad, Dimitris M. Kyriazanos. 262-267 [doi]
- A Survey of Botnet and Botnet DetectionMaryam Feily, Alireza Shahrestani, Sureswaran Ramadass. 268-273 [doi]
- Forward Secure ID-Based Group Key Agreement Protocol with AnonymityHyewon Park, Zeen Kim, Kwangjo Kim. 274-279 [doi]
- The Pushdown Attack on AESMohamed Abo El-Fotouh, Klaus Diepold. 280-285 [doi]
- Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the ProtocolPeter Lory. 286-291 [doi]
- Analysis of a Password Strengthening Technique and Its Practical UseBogdan Groza. 292-297 [doi]
- Correlation Based Node Behavior Profiling for Enterprise Network SecuritySu Chang, Thomas E. Daniels. 298-305 [doi]
- A Credit-Based Incentive Mechanism for Recommendation Acquisition in Multihop Mobile Ad Hoc NetworksWei Zhou, Zhiqiang Wei, Mijun Kang, Paddy Nixon, Lang Jia. 306-311 [doi]
- Detection of Security and Dependability Threats: A Belief Based Reasoning ApproachDavide Lorenzoli, George Spanoudakis. 312-320 [doi]
- Social Networks SecurityJan Nagy, Peter Pecho. 321-325 [doi]