Table of Contents:
  • Foundations of Security Analysis and Design
  • Security Protocols: Principles and Calculi
  • Secure Service Orchestration
  • IT Security Analysis Best Practices and Formal Approaches
  • Low-Level Software Security: Attacks and Defenses
  • Enhancing Java Security with History Based Access Control
  • On the Protection and Technologies of Critical Information Infrastructures
  • An Interpretation of Identity-Based Cryptography
  • Trust and Reputation Systems
  • An Introduction to the Role Based Trust Management Framework RT
  • Trusted Mobile Platforms.