Abstract is missing.
- Grid Authorization Based on Existing AAA ArchitecturesManuel Sánchez, Gabriel López, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta. 3-12
- A Secure Universal Loyalty CardSébastien Canard, Fabrice Clerc, Benjamin Morin. 13-22
- A Distributed Kerberized Access Architecture for Real Time GridsA. Moralis, Angelos Lenis, Mary Grammatikou, Symeon Papavassiliou, Basil S. Maglaris. 23-32
- A Model Driven Approach for Secure XML Database DevelopmentBelén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini. 33-46
- SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational WorkflowsMichael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak. 47-57
- Robust-audio-hash Synchronized Audio WatermarkingMartin Steinebach, Sascha Zmudzinski, Sergey Neichtadt. 58-66
- Securing Mobile Healthcare Systems Based on Information Classification: DITIS Case StudyEliana Stavrou, Andreas Pitsillides. 67-79
- Information Security and Business Continuity in SMEsAntti Tuomisto, Mikko Savela. 80-90
- The Place and Role of Security Patterns in Software Development ProcessOleksiy Mazhelis, Anton Naumenko. 91-100
- The Software Infrastructure of a Java Card Based Security Platform for Distributed ApplicationsSerge Chaumette, Achraf Karray, Damien Sauveron. 101-114
- A New Method for Embedding Secret Data to the Container Image Using Chaotic Discrete Orthogonal TransformsVladimir M. Chernov, Oleg Bespolitov. 115-124
- Modeling Deceptive Action in Virtual CommunitiesYi Hu, Brajendra Panda. 125-134
- SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information SystemsDaniel Mellado, Eduardo Fernández-Medina, Mario Piattini. 135-145
- Honeynets in 3G - A Game Theoretic AnalysisChristos K. Dimitriadis. 146-152
- Protecting Notification of Events in Multimedia SystemsEva Rodríguez, Silvia Llorente, Jaime Delgado. 153-162
- Security Patterns Related to Security RequirementsDavid G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. 163-173
- Towards a UML 2.0 Profile for RBAC Modeling in Activity DiagramsAlfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. 174-184
- Names in Cryptographic ProtocolsSimone Lupetti, Feike W. Dillema, Tage Stabell-Kulø. 185-194
- Secure Deployment of Applications to Fielded Devices and Smart CardsWilliam G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis. 195-206
- Improving Intrusion Detection through Alert VerificationThomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen. 207-216
- An Audit Method of Personal Data Based on Requirements EngineeringMiguel A. Martínez, Joaquín Lasheras, José Ambrosio Toval Álvarez, Mario Piattini. 217-231
- An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber AttacksLeisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael. 232-245
- An Electronic Voting System Supporting VoteWeightsCharlott Eliasson, Andre Zuquete. 246-255
- Developing a Maturity Model for Information System Security Management within Small and Medium Size EnterprisesLuís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini. 256-266
- Analyzing Preauthentication Timestamps To Crack Kerberos V PasswordsAhmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera. 267-277