Abstract is missing.
- Toward WS-certificateErnesto Damiani, Antonio Maña. 1-2 [doi]
- Efficient character-level taint tracking for JavaErika Chin, David Wagner. 3-12 [doi]
- A pattern-driven security advisor for service-oriented architecturesMaxim Schnjakin, Michael Menzel, Christoph Meinel. 13-20 [doi]
- An architecture for specification and enforcement of temporal access control constraints using OWLHassan Takabi, Minsoo Kim, James B. D. Joshi, Michael B. Spring. 21-28 [doi]
- The curse of namespaces in the domain of XML signatureMeiko Jensen, Lijun Liao, Jörg Schwenk. 29-36 [doi]
- Deductive policies with XACMLMario Lischka, Yukiko Endo, Manuel Sánchez Cuenca. 37-44 [doi]
- Extending the similarity-based XML multicast approach with digital signaturesAntonia Azzini, Stefania Marrara, Meiko Jensen, Jörg Schwenk. 45-52 [doi]
- A role-based XACML administration and delegation profile and its enforcement architectureMin Xu, Duminda Wijesekera. 53-60 [doi]