Abstract is missing.
- Towards Scalable Management of Privacy Obligations in EnterprisesMarco Casassa Mont. 1-10 [doi]
- A New User-Centric Identity Management Infrastructure for Federated SystemsVassilis Poursalidis, Christos Nikolaou. 11-20 [doi]
- Information Security Risk Assessment Model for Risk ManagementDariusz Wawrzyniak. 21-30 [doi]
- On the Limits of Cyber-InsuranceRainer Böhme, Gaurav Kataria. 31-40 [doi]
- Towards a Risk Management Perspective on AAIsChristian Schläger, Thomas Nowey. 41-50 [doi]
- Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business ProcessesAlfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. 51-61 [doi]
- A Framework for Exploiting Security Expertise in Application DevelopmentTheodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas. 62-70 [doi]
- On Diffusion and Confusion - Why Electronic Signatures Have FailedHeiko Roßnagel. 71-80 [doi]
- Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to PrivacyWesley Brandi, Martin S. Olivier. 81-90 [doi]
- A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in EnterprisesMarco Casassa Mont, Siani Pearson, Robert Thyne. 91-102 [doi]
- A Generic Privacy Enhancing Technology for Pervasive Computing EnvironmentsStelios Dritsas, John Tsaparas, Dimitris Gritzalis. 103-113 [doi]
- Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic SystemsSebastian Höhn. 114-122 [doi]
- Extending SQL to Allow the Active Usage of PurposesWynand van Staden, Martin S. Olivier. 123-131 [doi]
- FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition StrategyGuoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang. 132-141 [doi]
- A Framework for Modeling Restricted Delegation in Service Oriented ArchitectureMuhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner. 142-151 [doi]
- Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison FrameworkEleni Koutrouli, Aphrodite Tsalgatidou. 152-161 [doi]
- Towards Trust in Digital Rights Management SystemsJürgen Nützel, Anja Beyer. 162-171 [doi]
- Cluster-Based Analysis and Recommendation of Sellers in Online AuctionsMikolaj Morzy, Juliusz Jezierski. 172-181 [doi]
- Trust Model Architecture: Defining Prejudice by LearningMarika Wojcik, Jan H. P. Eloff, H. S. Venter. 182-191 [doi]
- How to Protect a Signature from Being Shown to a Third PartyMarek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks. 192-202 [doi]
- Security Analysis and Improvement for Key Issuing Schemes in ID-Based CryptographySaeran Kwon, Sang Ho Lee. 203-212 [doi]
- A Secure E-Tender Submission ProtocolRong Du, Colin Boyd, Ernest Foo. 213-222 [doi]
- A Sophisticated Solution for Revealing Attacks on Wireless LANRené Neumerkel, Stephan Groß. 223-232 [doi]
- Information Leakage in Ubiquitous Voice-over-IP CommunicationsThorsten Neumann, Heiko Tillwick, Martin S. Olivier. 233-242 [doi]