| 2006 | A Framework for Exploiting Security Expertise in Application Development. Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas |
| 2006 | A Framework for Modeling Restricted Delegation in Service Oriented Architecture. Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner |
| 2006 | A Generic Privacy Enhancing Technology for Pervasive Computing Environments. Stelios Dritsas, John Tsaparas, Dimitris Gritzalis |
| 2006 | A New User-Centric Identity Management Infrastructure for Federated Systems. Vassilis Poursalidis, Christos Nikolaou |
| 2006 | A Secure E-Tender Submission Protocol. Rong Du, Colin Boyd, Ernest Foo |
| 2006 | A Sophisticated Solution for Revealing Attacks on Wireless LAN. René Neumerkel, Stephan Groß |
| 2006 | A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises. Marco Casassa Mont, Siani Pearson, Robert Thyne |
| 2006 | Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems. Sebastian Höhn |
| 2006 | Cluster-Based Analysis and Recommendation of Sellers in Online Auctions. Mikolaj Morzy, Juliusz Jezierski |
| 2006 | Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy. Wesley Brandi, Martin S. Olivier |
| 2006 | Extending SQL to Allow the Active Usage of Purposes. Wynand van Staden, Martin S. Olivier |
| 2006 | FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy. Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang |
| 2006 | How to Protect a Signature from Being Shown to a Third Party. Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks |
| 2006 | Information Leakage in Ubiquitous Voice-over-IP Communications. Thorsten Neumann, Heiko Tillwick, Martin S. Olivier |
| 2006 | Information Security Risk Assessment Model for Risk Management. Dariusz Wawrzyniak |
| 2006 | On Diffusion and Confusion - Why Electronic Signatures Have Failed. Heiko Roßnagel |
| 2006 | On the Limits of Cyber-Insurance. Rainer Böhme, Gaurav Kataria |
| 2006 | Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework. Eleni Koutrouli, Aphrodite Tsalgatidou |
| 2006 | Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography. Saeran Kwon, Sang-Ho Lee |
| 2006 | Towards Scalable Management of Privacy Obligations in Enterprises. Marco Casassa Mont |
| 2006 | Towards Trust in Digital Rights Management Systems. Jürgen Nützel, Anja Beyer |
| 2006 | Towards a Risk Management Perspective on AAIs. Christian Schläger, Thomas Nowey |
| 2006 | Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini |
| 2006 | Trust Model Architecture: Defining Prejudice by Learning. Marika Wojcik, Jan H. P. Eloff, H. S. Venter |
| 2006 | Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis |