• Resource Classification Based Negotiation in Web Services

  • Levels of Authentication Assurance: an Investigation

  • Building Trustworthy Intrusion Detection through VM Introspection

  • A Theoretical Security Model for Access Control and Security Assurance

  • Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain

  • Risk management in coalition networks

  • Integrating Multi-Modal Circuit Features within an Efficient Encryption System

  • Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinux

  • A Security Model for Detecting Suspicious Patterns in Physical Environment

  • An LSB Data Hiding Technique Using Prime Numbers