Abstract is missing.
- Towards a Systematic Development of Secure SystemsRuth Breu, Klaus Burger, Michael Hafner, Gerhard Popp. 1-12
- Group Hierarchies with Constrained User Assignment in LinuxGail-Joon Ahn, Seng-Phil Hong. 13-22
- Risk Analysis of Biometric SystemsChristos K. Dimitriadis, Despina Polemi. 23-32
- Integrating Security and Privacy Issues in System DesignJan Guynes Clark, Nicole Beebe, Andrew G. Kotulic. 33-46
- Intrusion Risk Analysis and the Power Law Distribution of AttacksJuan Manuel Garcia Garcia. 47-52
- An Efficient Off-Line Reputation Scheme Using Articulated CertificatesRoslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell. 53-62
- A formal proof of security of Zhang and Kim s ID-based ring signature schemeJavier Herranz. 63-72
- B2C Internet Authentication method using Statistical Keystroke BiometricsMarino Tapiador, Juan A. Sigüenza. 73-78
- Diffusion Behaviour of Cryptographic Primitives in Feistel NetworksVasilios Katos. 79-87
- Authentication and Authorisation for Integrated SIP Services in Heterogeneous EnvironmentsDorgham Sisalem, Jiri Kuthan. 88-98
- Taxonomy of Trust Relationships in Peer-to-Peer (P2P) CommunicationFarookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon. 99-103
- A Secure Prepaid Wireless Micropayment ProtocolSupakorn Kungpisdan, Bala Srinivasan, Phu Dung Le. 104-113
- A Practical Implementation of a Real-time Intrusion Prevention System for Commercial Enterprise DatabasesUlf T. Mattsson. 114-125
- Efficient Tree Search in Encrypted DataRichard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker. 126-135
- A Generalized Policy Support System and Its Hierarchy SemanticsYibing Kong, Janusz R. Getta, Ping Yu, Jennifer Seberry. 136-145
- The Impact of Virus Attack Announcements on the Market Value of FirmsAnat Hovav, John D Arcy. 146-156
- A Formal Security Model for Collaboration in Multi-agency NetworksSalem Aljareh, B. Nick Rossiter, Michael A. Heather. 157-169
- Security Analysis of MOR using GL(2, R) x::Theta::Z::n::Christian Tobias. 170-179
- Open Secure Infrastructure to control User Access to multimedia contentCarlos Serrão, Gregor Siegert. 180-185
- Fair Trading Protocol With Off-line Anonymous Credit Card PaymentWeiliang Zhao, Vijay Varadharajan, George Bryan. 186-195
- Private Reputation Schemes for P2P systemsRoslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell. 196-206
- Filtering spam at e-mail server level with improved CRM114Víctor Méndez Muñoz, Julio César Hernández Castro, Jesús Carretero, Félix García. 207-216
- Health care and social inference systems: An unauthorized inference control based on fuzzy logicSouhila Kaci, Abdeslam Ali-Laouar, Frédéric Cuppens. 217-226
- An XML framework for multi-level access control in the enterprise domainIoannis Priggouris, Stathes Hadjiefthymiades, Lazaros F. Merakos. 227-236
- On the Role of the Inner State Size in Stream CiphersErik Zenner. 237-250
- An Access Control Model for Geographic Data in an XML -based FrameworkBat-Odon Purevjii, Toshiyuki Amagasa, Sayaka Imai, Yoshinari Kanamori. 251-260
- Certificate Revocation Lists or Online MechanismsVipul Goyal. 261-268
- Semantic Interoperability of AuthorizationsMariemma Inmaculada Yagüe del Valle, Antonio Mana, Francisco Sanchez. 269-278
- Promiscuous Mode Detection PlatformZouheir Trabelsi, Hamza Rahmani. 279-292
- Web Services Security: is the problem solved?Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. 293-304
- Secure Communications in Multi-Agent Systems Protecting KQMLJosé María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda. 305-313
- Hiding Traversal of Tree Structured Data from Untrusted Data StoresPing Lin, K. Selçuk Candan. 314-323
- Analysis of WEP Performance on Mobile DevicesArnulfo Ochoa Indart, Jesús Arturo Pérez Díaz. 324-331
- Risk Based Security Analysis of Permissions in RBACNimal Nissanke, Etienne J. Khayat. 332-341
- Towards a Classification of Security MetricsCarlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini. 342-350
- Security in the Management of Networks with SNMPv3L. Javier García-Villalba, J. Hamilton Ortiz Monedero, R. Paucar Curasma. 351-360