Abstract is missing.
- Trustbus 07 Keynote Talk: Privacy Enhanced PersonalizationAlfred Kobsa. 1 [doi]
- Panel Discussion: Managing Digital Identities - Challenges and OpportunitiesGünther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger. 2 [doi]
- Recognition of Authority in Virtual OrganisationsTuan-Anh Nguyen, David W. Chadwick, Bassem Nasser. 3-13 [doi]
- Securing VO ManagementFlorian Kerschbaum, Rafael Deitos, Philip Robinson. 14-23 [doi]
- Addressing Cultural Dissimilarity in the Information Security Management Outsourcing RelationshipAggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis. 24-33 [doi]
- Specification of the TrustMan System for Assisting Management of VBEsSimon Samwel Msanjila, Hamideh Afsarmanesh. 34-43 [doi]
- A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third PartyMin-Hua Shao. 44-53 [doi]
- Towards Automatic Assembly of Privacy-Preserved Intrusion SignaturesZhuowei Li, Amitabha Das, Jianying Zhou. 54-64 [doi]
- Privacy Assurance: Bridging the Gap Between Preference and PracticeTariq Ehsan Elahi, Siani Pearson. 65-74 [doi]
- Enhancing Optimistic Access Controls with Usage ControlKeshnee Padayachee, Jan H. P. Eloff. 75-82 [doi]
- Usage Control in Service-Oriented ArchitecturesAlexander Pretschner, Fabio Massacci, Manuel Hilty. 83-93 [doi]
- On Device-Based Identity Management in EnterprisesMarco Casassa Mont, Boris Balacheff. 94-103 [doi]
- Analysis-Level Classes from Secure Business Processes Through Model TransformationsAlfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. 104-114 [doi]
- A Trust and Context Aware Access Control Model for Web Services ConversationsMarijke Coetzee, Jan H. P. Eloff. 115-124 [doi]
- Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous DomainsPetros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas. 125-134 [doi]
- On Device Authentication in Wireless Networks: Present Issues and Future ChallengesGeorgios Kambourakis, Stefanos Gritzalis. 135-144 [doi]
- The Meaning of LogsSandro Etalle, Fabio Massacci, Artsiom Yautsiukhin. 145-154 [doi]
- Data Protection and Privacy Laws in the Light of RFID and Emerging TechnologiesGerald Quirchmayr, Christopher C. Wills. 155-164 [doi]
- Consistency of User Attribute in Federated SystemsQuan Pham, Adrian McCullagh, Ed Dawson. 165-177 [doi]
- Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid ProcessesKlaus-Peter Fischer, Udo Bleimann, Steven Furnell. 178-189 [doi]
- Situation-Based Policy EnforcementThomas Buntrock, Hans-Christian Esperer, Claudia Eckert. 190-200 [doi]
- Using Purpose Lattices to Facilitate Customisation of Privacy AgreementsWynand van Staden, Martin S. Olivier. 201-209 [doi]
- A Pattern-Driven Framework for Monitoring Security and DependabilityChristos Kloukinas, George Spanoudakis. 210-218 [doi]
- Security Aspects for Secure Download of Regulated SoftwareSibylle Hick, Christoph Ruland. 219-227 [doi]
- Using the Lens of Circuits of Power in Information Systems Security ManagementChristos Fragos, Maria Karyda, Evangelos A. Kiountouzis. 228-236 [doi]
- Fuzzy Service Selection and Interaction Review in Distributed Electronic MarketsStefan Schmidt, Robert Steele, Tharam S. Dillon. 237-247 [doi]
- X316 Security Toolbox for New Generation of CertificateRachid Saadi, Jean-Marc Pierson, Lionel Brunie. 248-258 [doi]
- Detecting Malicious SQLJosé Fonseca, Marco Vieira, Henrique Madeira. 259-268 [doi]
- Trusted Code Execution in JavaCardAntonio Maña, Antonio Muñoz. 269-279 [doi]
- How to Use ISO/IEC 24727-3 with Arbitrary Smart CardsDetlef Hühnlein, Manuel Bach. 280-289 [doi]