Abstract is missing.
- Statistical Identification of Encrypted Web Browsing TrafficQixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu. 19-30 [doi]
- Partitioning Attacks: Or How to Rapidly Clone Some GSM CardsJosyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stephane Tinguely. 31 [doi]
- Collaborative Filtering with PrivacyJohn F. Canny. 45-57 [doi]
- P5: A Protocol for Scalable Anonymous CommunicationRob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan. 58 [doi]
- Methods and Limitations of Security Policy ReconciliationPatrick Drew McDaniel, Atul Prakash. 73-87 [doi]
- On the Composition of Secure SystemsHeiko Mantel. 88 [doi]
- Binder, a Logic-Based Security LanguageJohn DeTreville. 105-113 [doi]
- Design of a Role-Based Trust-Management FrameworkNinghui Li, John C. Mitchell, William H. Winsborough. 114-130 [doi]
- Constrained DelegationOlav L. Bandmann, Babak Sadighi Firozabadi, Mads Dam. 131 [doi]
- Using Programmer-Written Compiler Extensions to Catch Security HolesKen Ashcraft, Dawson R. Engler. 143-159 [doi]
- Improving Computer Security Using Extended Static CheckingBrian Chess. 160 [doi]
- Noninterference and Intrusion DetectionCalvin Ko, Timothy Redmond. 177-187 [doi]
- Why 6? Defining the Operational Limits of Stide, an Anomaly-Based Intrusion DetectorKymie M. C. Tan, Roy A. Maxion. 188-201 [doi]
- Alert Correlation in a Cooperative Intrusion Detection FrameworkFrédéric Cuppens, Alexandre Miège. 202-215 [doi]
- Intrusion-Tolerant EnclavesBruno Dutertre, Valentin Crettaz, Victoria Stavridou. 216 [doi]
- Efficient Multicast Packet Authentication Using Signature AmortizationJung Min Park, Edwin K. P. Chong, Howard Jay Siegel. 227-240 [doi]
- Self-Healing Key Distribution with RevocationJessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean. 241-257 [doi]
- Expander Graphs for Digital Stream Authentication and Robust Overlay NetworksDawn Xiaodong Song, J. D. Tygar, David Zuckerman. 258 [doi]
- Automated Generation and Analysis of Attack GraphsOleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing. 273-284 [doi]
- Stateful Intrusion Detection for High-Speed NetworksChristopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer. 285 [doi]