Table of contents (PDF)
Title Page i (PDF)
Title Page iii (PDF)
Preface (PDF)
Committees (PDF)
A Secure Task Delegation Model for Workflows (Abstract)
Formal Modeling of Authentication in SIP Registration (Abstract)
Team?-Based MAC Policy over Security-?Enhanced Linux (Abstract)
Defending E-Banking Services: Antiphishing Approach (Abstract)
Preventing Insider Information Leakage for Enterprises (Abstract)
The Automatic Discovery, Identification and Measurement of Botnets (Abstract)
Email Worm Mitigation by Controlling the Name Server Response Rate (Abstract)
Anti-counterfeiting with a Random Pattern (Abstract)
Optimal Trust Network Analysis with Subjective Logic (Abstract)
From Monitoring Templates to Security Monitoring and Threat Detection (Abstract)
Generic and Complete Three-Level Identity Management Model (Abstract)
Generation of Diagnostic Plans for Large ICT Systems (Abstract)
A New Anti-phishing Method in OpenID (Abstract)
Designing an Undergraduate Software Security Course (Abstract)
Security Governance for Enterprise VoIP Communication (Abstract)
Generation of Diagnostic Plans for Large ICT Systems (Abstract)
Advanced Rule-Based Techniques in Mission Critical Systems (Abstract)
Agent Based Approach to Events Monitoring in Complex Information Systems (Abstract)
Policy-Driven System Configuration for Dependability (Abstract)
A Dependability Case Approach to the Assessment of IP Networks (Abstract)
Author Index (PDF)