Abstract is missing.
- Model-Driven Approaches to SecurityRuth Breu. 3
- A Key Management Method for Cryptographically Enforced Access ControlAnna Zych, Milan Petkovic, Willem Jonker. 9-22
- A Proposal for Extending the Eduroam Infrastructure with Authorization MechanismsManuel Sáchez Cuenca, Gabriel López, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta. 23-32
- A New Way to Think About Secure Computation: Language-based Secure ComputationFlorian Kerschbaum. 33-42
- RoboAdmin: A Different Approach to Remote System AdministrationMarco Ramilli, Marco Prandini. 43-52
- A Reputation System for Electronic NegotiationsOmid Tafreschi, Dominique Maehler, Janina Fengel, Michael Rebstock, Claudia Eckert. 53-62
- A Fair Non-repudiation Service in a Web Services Peer-to-Peer EnvironmentBerthold Agreiter, Michael Hafner, Ruth Breu. 63-72
- Research on Counter Http DDoS Attacks based on Weighted Queue Random Early Drop Rui Guo, Guiran Chang, Hou Ruidong, Baojing Sun, An Liu, Bencheng Zhang. 73-81
- Comparison of IPsec to TLS and SRTP for Securing VoIPBarry Sweeney, Duminda Wijesekera. 82-92
- Security in T::ci::NMP SystemsKatalin Anna Lázá, Csilla Farkas. 95-104
- Confining the Insider Threat in Mass Virtual Hosting SystemsMarco Prandini, Eugenio Faldella, Roberto Laschi. 105-114
- A General Approach to Securely Querying XMLErnesto Damiani, Majirus Fansi, Alban Gabillon, Stefania Marrara. 115-122
- New Primitives to AOP Weaving Capabilities for Security Hardening ConcernsAzzam Mourad, Marc-André Laverdière, Mourad Debbabi. 123-130
- On the Relationship between Confidentiality Measures: Entropy and GuessworkReine Lundin, Thijs Holleboom, Stefan Lindskog. 135-144
- A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc NetworksKlaus Plößl, Hannes Federrath. 145-154
- A Three Layered Model to Implement Data Privacy PoliciesGerardo Canfora, Corrado Aaron Visaggio. 155-165
- Implementing Mobile DRM with MPEG 21 and OMASilvia Llorente, Jaime Delgado, Xavier Maronas. 166-175
- Inferring Secret Information in Relational DatabasesStefan Böttcher. 179-187
- A DRM Architecture for Securing User Privacy by DesignDaniel Kadenbach, Carsten Kleiner, Lukas Grittner. 188-195
- An Ontology for the Expression of Intellectual Property Entities and RelationsVíctor Rodríguez, Marc Gauvin, Jaime Delgado. 196-203
- Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA ApproachAlfonso Rodríguez, Ignacio García Rodríguez de Guzmán. 209-219
- SREPPLine: Towards a Security Requirements Engineering Process for Software Product LinesDaniel Mellado, Eduardo Fernández-Medina, Mario Piattini. 220-232
- MMISS-SME Practical Development: Maturity Model for Information Systems Security Management in SMEsLuís Enrique Sanchez, Daniel Villafranca, Mario Piattini. 233-244
- SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical LevelEmilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. 245-256