Multilateral Security: Enabling Technologies and Their Evaluation

Do you trust your recommendations? : an exploration of security and privacy issues in recommender systems p. 14 Optimized workflow authorization in service oriented architectures p. 30 Dynamic layer-2 VPN services for improving security in the grid environment p. 45 A P2P content authentication protocol based on byzantine agreement p. 60 Transitive trust in mobile scenarios p. 73 An open, PKI-based mobile payment system p. 86 Secure rejoining scheme for dynamic sensor networks p. 101 Developing provable secure M-commerce applications p. 115 An algebra for enterprise privacy policies closed under composition and conjunction p. 130 Privacy-preserving decision tree mining based on random substitutions p. 145 Policy-based integration of user and provider-sided identity management p. 160 Privacy with delegation of rights by identity management p. 175 A framework for quantification of linkability within a privacy-enhancing identity management system p. 191 Revocable anonymity p. 206 Low latency anonymous communication-how long are users willing to wait? p. 221 Security engineering using problem frames p. 238 SecTOOL-supporting requirements engineering for access control p. 254 Posaibilistic information flow control in MAKS and action refinement p. 268 Toward a framework for forensic analysis of scanning worms p. 282 A comparison of market approaches to software vulnerability disclosure p. 298 Reliable keystroke biometric system based on a small number of keystroke samples p. 312 Allowing state changes in specifications p. 321 Field access analysis for enforcing access control policies p. 337 Controlling access to documents : a formal access control model p. 352 How to increase the security of digital rights management systems without affecting consumer's security p. 368 Secure end-to-end transport over SCTP p. 381 An extended model of rational exchange based on dynamic games of imperfect information p. 396 Filtering for private collaborative benchmarking p. 409 On the use of word networks to mimicry attack detection p. 423 Simplifying signature engineering by reuse p. 436 Redesign and implementation of evaluation dataset for intrusion detection system p. 451 Requirements of information reductions for cooperating intrusion detection agents p. 466 Quantum algorithm for solving the discrete logarithm problem in the class group of an imaginary quadratic field and security comparison of current cryptosystems at the beginning of quantum computer age p. 481