Abstract is missing.
- Analysing the Woo-Lam Protocol Using CSP and Rank FunctionsSiraj A. Shaikh, Vicky J. Bush. 3-12
- A Secure Hash-Based Strong-Password Authentication SchemeShuyao Yu, Youkun Zhang, Runguo Ye, Chuck Song. 13-20
- An Approach for the Analysis of Security Standards for Authentication in Distributed SystemsH. A. Eneh, Orhan Gemikonakli. 21-30
- An Effective Certificateless Signature Scheme Based on Bilinear PairingsM. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena. 31-39
- ID-based Serial Multisignature Scheme using Bilinear PairingsRaju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati. 40-47
- Transitive Signatures Based on Bilinear MapsChangshe Ma, Kefei Chen, Shengli Liu, Dong Zheng. 48-56
- MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols UsageRobson de Oliveira Albuquerque, Maíra Hanashiro, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, Luis Javier García-Villalba. 57-66
- SisBrAV - Brazilian Vulnerability Alert SystemRobson de Oliveira Albuquerque, Daniel Silva Almendra, Leonardo Lobo Pulcineli, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, Luis Javier García-Villalba. 67-76
- Honeynet Clusters as an early Warning System for Production NetworksSushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera. 77-83
- A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University s NetworkCláudia J. Barenco Abbas, Alessandra Lafetá, Giuliano Arruda, Luis Javier García-Villalba. 84-93
- A Real-time Intrusion Prevention System for Commercial Enterprise Databases and File SystemsUlf T. Mattsson. 94-101
- Public-Key Encryption Based on Matrix Diagonalization ProblemJiande Zheng. 102-112
- Cooperative Defense against Network AttacksGuangsen Zhang, Manish Parashar. 113-122
- A Protocol for Incorporating Biometrics in 3G with Respect to PrivacyChristos K. Dimitriadis, Despina Polemi. 123-135
- Tree Automata for Schema-level Filtering of XML Associations Vaibhav Gowadia, Csilla Farkas. 136-145
- An Attribute-Based-Delegation-Model and Its ExtensionChunxiao Ye, Zhongfu Wu, Yunqing Fu. 146-159
- A Systematic Approach to AnonymitySabah S. Al-Fedaghi. 160-172
- Controlled Sharing of Personal Content using Digital Rights ManagementClaudine Conrado, Milan Petkovic, Michiel van der Veen, Wytse van der Velde. 173-185
- Using Reputation Systems to Cope with Trust Problems in Virtual OrganizationsMarco Voss, Wolfram Wiesemann. 186-195
- External Object Trust Zone Mapping for Information ClusteringYanjun Zuo, Brajendra Panda. 196-206
- A UML-Based Methodology for Secure Systems: The Design Stage Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie. 207-216
- Towards a UML 2.0/OCL extension for designing Secure Data WarehousesRodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. 217-228
- Secure UML Information Flow using FlowUMLKhaled Alghathbar, Duminda Wijesekera, Csilla Farkas. 229-238
- Return On Security Investment (ROSI): A Practical Quantitative ModelWes Sonnenreich, Jason Albanese, Bruce Stout. 239-252
- An Approach for Modeling Information Systems Security Risk AssessmentSubhas C. Misra, Vinod Kumar, Uma Kumar. 253-262
- Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation FacilityPeter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin. 263-276
- Stateful Design for Secure Information SystemsThuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting. 277-286
- Towards an integration of Security Requirements into Business Process ModelingAlfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. 287-297
- Towards a Process for Web Services SecurityCarlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. 298-308
- Analysis of the Phishing Email Problem and Discussion of Possible SolutionsChristine E. Drake, Andrew Klein, Jonathan J. Oliver. 309-318
- Validating the Security of Medusa: A survivability Protocol for Security SystemsWiebe K. Wiechers, Semir Daskapan. 319-330
- An Efficient and Simple Way to Test the Security of Java CardsTMSerge Chaumette, Damien Sauveron. 331-341