I Role-Based Access Control.- 1 Shielding RBAC Infrastructures from Cyberterrorism.- 2 Privilege Administration for the Role Graph Model.- 3 Implementing RBAC Policies.- 4 Role Delegation for a Resource-Based Security Model.- 5 Using X.509 Attribute Certificates for Role-Based EAM.- 6 Implementing Workflow Systems.- II Database Security.- 7 Multiphase Damage Confinement System for Databases.- 8 Analyzing Transaction Logs for Effective Damage Assessment.- 9 Deductive Database Security.- III XML Security.- 10 Towards Secure XML Federations.- 11 Secure XML Views.- 12 Distributed Cooperative Updates of XML Documents.- IV Data Mining and Inference.- 13 On Security and Privacy Risks in Association Mining Algorithms.- 14 Mining Malicious Corruption of Data with Hidden Markov Models.- 15 A Study of Inference Problems in Distributed Databases.- V Multimedia System Security.- 16 Uniform Indexing for Geospatial Data and Authorizations.- 17 Access Control of SVG Documents.- VI Network Security.- 18 On Modeling Computer Networks for Vulnerability Analysis.- 19 On-line Intrusion Protection by Detecting Attacks with Diversity.- VII Public Key Infrastructure.- 20 Recertification: A Technique to Improve Services in PKI.- 21 A Hybrid PKI Model: Application to Secure Mediation.- VIII Formal Methods and Protocols.- 22 Implementation and Verification of Programmable Security.- 23 A Process Algebraic Approach to Security Policies.- 24 Anonymous and Secure Multicast Subscription.- IX Security and Privacy.- 25 Privacy and Civil Liberties.