1. Title and Table of Contents
  2. Introduction to Security
  3. Introduction to Privacy in Computing
  4. Privacy Enhancing Technologies
  5. Introduction to Trust in Computing
  6. Security Paradigms and Pervasive Trust
  7. Trust Negotiations and Trading Privacy for Trust
  8. Using Trust for Role-Based Access Control
  9. Trust in P2P Systems
  10. Role-Based Access Control(RBAC)
  11. P2D2: A Mechanism for Privacy Preserving Data Dissemination
  12. Private and Trusted Interactions
  13. Detecting Service Violations in Internet & Mobile Ad Hoc Networks
  14. Vulnerabilities and Threats in Distributed Systems
  15. Proposal of Prof. Leszek Lilien (WMU)
  16. Others: Secure Communication in Cellular and Ad Hoc Environments
  17. Others: Intruder Identification in Ad Hoc Networks