Lam-For Kwok, and Dennis Longley Mining Business-Relevant RBAC States through Decomposition ,
Alberto Ocello, and Nino Vincenzo Verde Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study, p.31 ,
When Compliance Becomes More Important than, p.55 ,
Ruighaver, and Atif Ahmad Network Security & Authentication Understanding Domain Registration Abuses, p.68 ,
Reiter Who on Earth Is " Mr. Cypher " : Automated Friend Injection Attacks on Social Networking Sites, p.80 ,
Weippl Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems, p.90 ,
Tobias Raub, and Ulrich Flegel Use of IP Addresses for High Rate Flooding Attack Detection, p.124 ,
Alan Tickle, and Sajal Bhatia Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information, p.136 ,
148 Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, and Hervé Debar Software Security and Assurance A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism, p.161 ,
Konstantinos Markantonakis, and Keith Mayes On-the-fly Inlining of Dynamic Security Monitors, p.173 ,
187 Gideon Myles and Hongxia Jin Evaluation of the Offensive Approach in Information Security Education, 203 Martin Mink and Rainer Greifeneder Panel Research Methodologies in Information Security Research, p.215 ,
van Niekerk and Rossouw von Solms Table of Contents XVII Access Control and Privacy Purpose-Based Access Control Policies and Conflicting Analysis, p.217 ,
Varadharajan Delegation in Predicate Encryption Supporting Disjunctive Queries Colin Boyd, and Juan Manuel González Nieto Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy, 229 Dongdong Sun, p.241 ,
Noboru Sonehara, and Günter Müller k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments, p.253 ,
265 Mark Stegelmann How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the, 277 Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, and Kai Rannenberg Performance Analysis of Accumulator-Based Revocation Mechanisms, p.289 ,
Bart De Decker, and Vincent Naessens Appendix IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems, p.302 ,