| 2008 | A Generic Intrusion Detection Game Model in IT Security. Ioanna Kantzavelou, Sokratis K. Katsikas |
| 2008 | A Map of Trust between Trading Partners. John K. Debenham, Carles Sierra |
| 2008 | A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony. Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis |
| 2008 | A Model for Trust Metrics Analysis. Isaac Agudo, M. Carmen Fernández Gago, Javier López |
| 2008 | A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. Indrakshi Ray, Manachai Toahchoodee |
| 2008 | A User-Centric Protocol for Conditional Anonymity Revocation. Suriadi Suriadi, Ernest Foo, Jason Smith |
| 2008 | Biometrics - How to Put to Use and How Not at All?. Andreas Pfitzmann |
| 2008 | BusiROLE: A Model for Integrating Business Roles into Identity Management. Ludwig Fuchs, Anton Preis |
| 2008 | Combining Trust and Reputation Management for Web-Based Services. Audun Jøsang, Touhid Bhuiyan, Yue Xu, Clive Cox |
| 2008 | Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori |
| 2008 | Fairness Emergence through Simple Reputation. Adam Wierzbicki, Radoslaw Nielek |
| 2008 | Implementation of a TCG-Based Trusted Computing in Mobile Device. SuGil Choi, Jin-Hee Han, Jeong-Woo Lee, Jongpil Kim, Sungik Jun |
| 2008 | Multilateral Secure Cross-Community Reputation Systems for Internet Communities. Franziska Pingel, Sandra Steinbrecher |
| 2008 | Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing. Susana Alcalde Bagüés, Jelena Mitic, Andreas Zeidler, Marta Tejada, Ignacio R. Matías, Carlos Fernández-Valdivielso |
| 2008 | On the Design Dilemma in Dining Cryptographer Networks. Jens O. Oberender, Hermann de Meer |
| 2008 | Patterns and Pattern Diagrams for Access Control. Eduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie |
| 2008 | Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. Wesley Brandi, Martin S. Olivier, Alf Zugenmaier |
| 2008 | Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy. Subhendu Aich, Shamik Sural, Arun K. Majumdar |
| 2008 | The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
| 2008 | Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings Steven Furnell, Sokratis K. Katsikas, Antonio Lioy |