Abstract is missing.
- Uncertainty, Subjectivity, Trust and Risk: How It All Fits togetherBjørnar Solhaug, Ketil Stølen. 1-5 [doi]
- Trust Extortion on the InternetAudun Jøsang. 6-21 [doi]
- Trust Areas: A Security Paradigm for the Future InternetCarsten Rudolph. 22-27 [doi]
- Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile SecurityStephen Marsh, Sylvie Noël, Tim Storer, Yao Wang, Pamela Briggs, Lewis Robart, John A. Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva. 28-39 [doi]
- A Proof-Carrying File System with Revocable and Use-Once CertificatesJamie Morgenstern, Deepak Garg, Frank Pfenning. 40-55 [doi]
- New Modalities for Access Control Logics: Permission, Control and RatificationValerio Genovese, Deepak Garg. 56-71 [doi]
- Security Notions of Biometric Remote Authentication RevisitedNeyire Deniz Sarier. 72-89 [doi]
- Hiding the Policy in Cryptographic Access ControlSascha Müller, Stefan Katzenbeisser. 90-105 [doi]
- Location Privacy in Relation to Trusted PeersKlaus Rechert, Benjamin Greschbach. 106-121 [doi]
- Fairness in Non-Repudiation ProtocolsWojciech Jamroga, Sjouke Mauw, Matthijs Melissen. 122-139 [doi]
- Risk-Aware Role-Based Access ControlLiang Chen, Jason Crampton. 140-156 [doi]
- Automated Analysis of Infinite State Workflows with Access Control PoliciesAlessandro Armando, Silvio Ranise. 157-174 [doi]
- The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature SchemesHenrich Christopher Pöhls, Focke Höhne. 175-192 [doi]
- Mutual Remote Attestation: Enabling System Cloning for TPM Based PlatformsUlrich Greveler, Benjamin Justus, Dennis Löhr. 193-206 [doi]
- Secure Architecure for the Integration of RFID and Sensors in Personal NetworksPablo Najera, Rodrigo Roman, Javier Lopez. 207-222 [doi]
- Accepting Information with a Pinch of Salt: Handling Untrusted Information SourcesSyed Sadiqur Rahman, Sadie Creese, Michael Goldsmith. 223-238 [doi]