J. William and . Caelli, Lam-For Kwok, and Dennis Longley Mining Business-Relevant RBAC States through Decomposition

A. Colantonio, R. D. , and P. , Alberto Ocello, and Nino Vincenzo Verde Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study, p.31

K. Hedström, G. Dhillon, F. Karlsson-information-security-governance-security, and .. , When Compliance Becomes More Important than, p.55

C. C. Terence, . Tan, and B. Anthonie, Ruighaver, and Atif Ahmad Network Security & Authentication Understanding Domain Registration Abuses, p.68

E. Scott, A. M. Coull, . White, F. Ting-fang-yen, . Monrose et al., Reiter Who on Earth Is " Mr. Cypher " : Automated Friend Injection Attacks on Social Networking Sites, p.80

M. Huber, M. Mulazzani, and E. , Weippl Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems, p.90

M. Asadul-khandoker-islam, G. Corney, A. Mohay, S. Clark, and . Bracher, Tobias Raub, and Ulrich Flegel Use of IP Addresses for High Rate Flooding Attack Detection, p.124

E. Ahmed, G. Mohay, and .. , Alan Tickle, and Sajal Bhatia Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information, p.136

.. Ex-sdf-assessment, 148 Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, and Hervé Debar Software Security and Assurance A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism, p.161

R. Naeem and A. , Konstantinos Markantonakis, and Keith Mayes On-the-fly Inlining of Dynamic Security Monitors, p.173

J. Magazinius, A. Russo, A. Sabelfeld, A. Metric-based, and .. Scheme-for-evaluating-tamper-resistant-software-systems, 187 Gideon Myles and Hongxia Jin Evaluation of the Offensive Approach in Information Security Education, 203 Martin Mink and Rainer Greifeneder Panel Research Methodologies in Information Security Research, p.215

F. Johan, van Niekerk and Rossouw von Solms Table of Contents XVII Access Control and Privacy Purpose-Based Access Control Policies and Conflicting Analysis, p.217

H. Wang, L. Sun, and V. , Varadharajan Delegation in Predicate Encryption Supporting Disjunctive Queries Colin Boyd, and Juan Manuel González Nieto Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy, 229 Dongdong Sun, p.241

S. Wohlgemuth, I. Echizen, and .. , Noboru Sonehara, and Günter Müller k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments, p.253

O. Hasan, L. Brunie, E. Picos-project, and .. , 265 Mark Stegelmann How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the, 277 Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, and Kai Rannenberg Performance Analysis of Accumulator-Based Revocation Mechanisms, p.289

J. Lapon, M. Kohlweiss, and .. , Bart De Decker, and Vincent Naessens Appendix IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems, p.302