Multilateral Security
Multilateral Security: Enabling Technologies and Their Evaluation
Do You Trust Your Recommendations? An Exploration of Securityand Privacy Issues in Recommender Systems
Security in Service-Oriented Computing
Optimized Workflow Authorization in Service Oriented Architectures
Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment
A P2P Content Authentication Protocol Based on Byzantine Agreement
Secure Mobile Applications
Transitive Trust in Mobile Scenarios
An Open, PKI-Based Mobile Payment System
Secure Rejoining Scheme for Dynamic Sensor Networks
Developing Provable Secure M-Commerce Applications
Enterprise Privacy
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy, Identity, and Anonymity
Policy-Based Integration of User and Provider-Sided Identity Management
Privacy with Delegation of Rights by Identity Management
A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System
Revocable Anonymity
Low Latency Anonymous Communication - How Long Are Users Willing to Wait?
Security Engineering
Security Engineering Using Problem Frames
SEcTOOL - Supporting Requirements Engineering for Access Control
Possibilistic Information Flow Control in MAKS and Action Refinement
Toward a Framework for Forensic Analysis of Scanning Worms
A Comparison of Market Approaches to Software Vulnerability Disclosure
……
Security Policies
Security and Protocls
Intrusion Detection
Perspectives of Cryptographic Security
Author Index