| 2007 | A Pattern-Driven Framework for Monitoring Security and Dependability. Christos Kloukinas, George Spanoudakis |
| 2007 | A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party. Min-Hua Shao |
| 2007 | A Trust and Context Aware Access Control Model for Web Services Conversations. Marijke Coetzee, Jan H. P. Eloff |
| 2007 | Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis |
| 2007 | Analysis-Level Classes from Secure Business Processes Through Model Transformations. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini |
| 2007 | Consistency of User Attribute in Federated Systems. Quan Pham, Adrian McCullagh, Ed Dawson |
| 2007 | Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies. Gerald Quirchmayr, Christopher C. Wills |
| 2007 | Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas |
| 2007 | Detecting Malicious SQL. José Fonseca, Marco Vieira, Henrique Madeira |
| 2007 | Enhancing Optimistic Access Controls with Usage Control. Keshnee Padayachee, Jan H. P. Eloff |
| 2007 | Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets. Stefan Schmidt, Robert Steele, Tharam S. Dillon |
| 2007 | How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards. Detlef Hühnlein, Manuel Bach |
| 2007 | On Device Authentication in Wireless Networks: Present Issues and Future Challenges. Georgios Kambourakis, Stefanos Gritzalis |
| 2007 | On Device-Based Identity Management in Enterprises. Marco Casassa Mont, Boris Balacheff |
| 2007 | Panel Discussion: Managing Digital Identities - Challenges and Opportunities. Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger |
| 2007 | Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. Klaus Peter Fischer, Udo Bleimann, Steven Furnell |
| 2007 | Privacy Assurance: Bridging the Gap Between Preference and Practice. Tariq Ehsan Elahi, Siani Pearson |
| 2007 | Recognition of Authority in Virtual Organisations. Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser |
| 2007 | Securing VO Management. Florian Kerschbaum, Rafael Deitos, Philip Robinson |
| 2007 | Security Aspects for Secure Download of Regulated Software. Sibylle Hick, Christoph Ruland |
| 2007 | Situation-Based Policy Enforcement. Thomas Buntrock, Hans-Christian Esperer, Claudia Eckert |
| 2007 | Specification of the TrustMan System for Assisting Management of VBEs. Simon Samwel Msanjila, Hamideh Afsarmanesh |
| 2007 | The Meaning of Logs. Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin |
| 2007 | Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. Zhuowei Li, Amitabha Das, Jianying Zhou |
| 2007 | Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings Costas Lambrinoudakis, Günther Pernul, A Min Tjoa |
| 2007 | Trustbus'07 Keynote Talk: Privacy Enhanced Personalization. Alfred Kobsa |
| 2007 | Trusted Code Execution in JavaCard. Antonio Maña, Antonio Muñoz |
| 2007 | Usage Control in Service-Oriented Architectures. Alexander Pretschner, Fabio Massacci, Manuel Hilty |
| 2007 | Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. Wynand van Staden, Martin S. Olivier |
| 2007 | Using the Lens of Circuits of Power in Information Systems Security Management. Christos Fragos, Maria Karyda, Evangelos A. Kiountouzis |
| 2007 | X316 Security Toolbox for New Generation of Certificate. Rachid Saadi, Jean-Marc Pierson, Lionel Brunie |