Support for multi-level security policies in DRM architectures (DOI)
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum
A collaborative approach to autonomic security protocols (DOI)
Hongbin Zhou, Simon N. Foley
A qualitative framework for Shannon information theories (DOI)
Gerard Allwein
The user non-acceptance paradigm: INFOSEC's dirty little secret (DOI)
Steven J. Greenwald, Kenneth G. Olthoff, Victor Raskin, Willibald Ruch
Towards agile security assurance (DOI)
Konstantin Beznosov, Philippe Kruchten
Information exposure control through data manipulation for ubiquitous computing (DOI)
Boris Dragovic, Jon Crowcroft
Property-based attestation for computing platforms: caring about properties, not mechanisms (DOI)
Ahmad-Reza Sadeghi, Christian Stüble
Symmetric behavior-based trust: a new paradigm for internet computing (DOI)
Vivek Haldar, Michael Franz
The role of suspicion in model-based intrusion detection (DOI)
Timothy Hollebeek, Rand Waltzman
Omnivore: risk management through bidirectional transparency (DOI)
Scott Flinn, Steve Stoyles
Profiling the defenders (DOI)
Carrie Gates, Tara Whalen