Preface. Acknowledgements. Part one - Reviewed papers; 1. IT Security Certification and Criteria; K. Rannenberg. 2. Information Security: Process Evaluation and Product Evaluation; M. Eloff, B. von Solms. 3.Managing Information Security in Healthcare - an Action Research Experience; H. Armstrong. 4.From Trusted Information Security Controls to a Trusted Information Security Environment; R. von Solms, H. van de Haar. 5. A Qualitative Approach to Information Availability; T. Tryfonas, et al. 6. A Postgraduate Programme on Information and Communication Systems Security; S. K. Katsikas. 7. Information Security Management through Measurement; E. von Solms, B. von Solms. 8.The Defense Framework for Large-scale Computer Network System; J. Jiang, et al. 9. Identity Mapping: An Approach to Unravel Enterprise Security Management Policies; W. Essmayr, E. Weippl. 10. Independent Policy Oriented Layering of Security Services; H. Leitold, et al. 11. Reducing Computer Fraud through Situational Crime Prevention; R. Willison. 12. Policies for Construction of Information Systems' Security Guidelines: Five Approaches; M. T. Siponen. 13. DNA-proofing' for Computer Systems - A New Approach to Computer Security? B. Louwrens, B. von Solms. 14.Using Smart Cards in an Educational Environment: Services and Security Features; C. Lambrinoudakis. 15.MASS: Model for an Auditing Security System; A. Liebenberg, J. Eloff. 16. Classifying Information for External Release; S. Dawson, et al. 17. Using Mobile Agent Results to Create Hard-To-Detect Computer Viruses; Y. Wang. 18.CARDS: A Distributed System for Detecting Coordinated Attacks; J. Yang, et al. 19.Robust Audio Watermarking based on Secure Spread Spectrum and Auditory Perception Model; P. Horvatic, et al. 20.A Simple and Efficient Approach to Verifying Cryptographic Protocols; S. Yongxing, W. Xinmei. 21. Power Analysis of RC6 and Serpent; W. Wenling, et al. 22.A Simple Algorithm for Computing Several Sequences Synthesis; W. Mingsheng, et al. 23. GSFS -- A New Group-Aware Cryptographic File System; C. Eckert, et al. 24. Robustness-Agile Encryptor for ATM Networks; H. Leitold, et al. 25. Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties; J. Chao, et al. 26. A New Serial/Parallel Architecture for a Low Power Modular Multiplier; J. Grossschadl. 27.Defending Against Null Calls Stream Attacks by Using a Double-Threshold Dynamic Filter; H. Xu, et al. 28.A Multi-party Non-repudiation Protocol; S. Kremer, O. Markowitch. 29.Analysis and Design of E-voting Protocol; J. Shaoquan, et al. 30. Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community; V. Gorodetski, et al. 31. Towards Network Denial of Service Resistant Protocols; J. Leiwo, et al. 32. A Generic Graphical Specification Environment for Security Protocol Modelling; E. Saul, A. Hutchison. 33.Anonymous Electronic Voting System with Non-Transferable Voting Passes; R. Chan, et al. 34. Improving Packet Filters Management through Automatic and Dynamic Schemes; O. Paul, M. Laurent. 35. A Context-Sensitive Access Control Model and Prototype Implementation; D. Cholewka, et al. 36.Regulating Access to Semistructured Information on the Web; E. Damiani, et al. 37. On the Practical Feasibility of Secure Distributed Computing: A Case Study; G. Neven, et al. 38. Elements of A Language for Role-Based Access Control; M. Hitchens, V. Varadharajan.39. Disallowing Unauthorized State Changes of Distributed Shared Objects; J. Leiwo, et al. 40. Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network; I. Greenshields, Z. Yang. 41. On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations; M. Siponen. 42. Information Warfare: Fact or Fiction? M. Warren, W. Hutchinson. 43. Enforcing Privacy by Withholding Private Information; F. Lategan, M. Olivier. 44. The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age; G. Kirsch, T. Xia. 45. A Framework for Electronic Commerce Security; L. Labuschagne. 46. Electronic Payment Systems with Fair On-line Verification; F. Bao, et al. 47. Fair Electronic Cash Systems with Multiple Banks; F. Zhang, et al. 48. Securing Mobile Agents for Electronic Commerce: an Experiment; A. Chan, et al. 49. A Flexible Management Framework for Certificate Status Validation; A. Corradi, et al. 50. A Security Architecture for Electronic Commerce Applications; B. De Win, et al. Part Two -- Invited papers: 51. On the Development of the Advanced Encryption Standard; Y. L. Yin. 52. Public Key Infrastructure: Managing the e-Business Security; X. Lai. Index of contributors.