Contributing Authors. Preface. Conference Committees. One: Information Warfare. Remote Computer Fingerprinting for Cyber Crime Investigations; J. Novotny, et al. Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases; P. Ragothaman, B.
Panda. Two: Information Assurance. Delivering Services with Integrity Guarantees in Survivable Database Systems; Jianyong Zhang, Peng Liu. Certifying Data from Multiple Sources; G. Nuckolls, et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model; H. Hacigümüs, et al. Adapting Query Optimization Techniques for Efficient Alert Correlation; Peng Ning, Dingbang Xu.
Three: Security and Privacy. Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases; E. Gudes, B. Rozenberg. Privacy under Conditions of Concurrent Interaction with Multiple Parties; M.S. Oliver. Correlated Data Inference; C.
Farkas, A.G. Stoica. Anti-Tamper Databases: Querying Encrypted Databases; G. Ozsoyoglu, et al. Four: Authorization and Access Control in Distributed Systems. Administration Rights in the SDSD-System; J. Biskup, et al.
Secure Authorization for Web Services; S. Indrakanti, et al. A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities; E. Bertino, et al. Supporting Delegation in Secure Workflow Management Systems; V. Atluri, et al. Five: Security Technologies for the Internet. Modifying LDAP to Support PKI; D.
W. Chadwick, et al. ECPV: Efficient Certificate Path Validation in Public-Key Infrastructure; M. Halappanavar, R. Mukkamala. Semantics-Aware Perimeter Protection; M. Cremonini, et al. Systematic Development of a Family of Fair Exchange Protocols; P.
D. Ezhilchelvan, S.K. Shrivastava. Six: Access Control Models and Technologies. High-Speed Access Control for XML Documents; Jong P. Yoon. Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses; Tsau Young Lin.
RBAC Policy Implementation for SQL Databases; S. Barker, P. Douglas. An Administrative Model for Role Graphs; He Wang, S.L. Osborne. Safety and Liveness for an RBAC/MAC Security Model; C. Phillips, et al.
Schema-Based XML Security: RBAC Approach; Xinwen Zhang, et al. Persistent versus Dynamic Role Membership; J. Bacon, et al. FlexFlow: A Flexible Flow Control Policy Specification Framework; Shiping Chen, et al. Seven: Key Note. Data and Applications Security: Past, Present and Future; B. Thuraisingham. Eight: Panel.
Digital Forensics: Operational, Legal and Research Issues; M. Pollitt, et al.