Automated Security Configuration Management Ehab Al-ShaerCharles R. KalmanekFelix Wu EditorialNotes 29 October 2008 Pages: 231 - 233
Declarative Infrastructure Configuration Synthesis and Debugging Sanjai NarainGary LevinVikram Kaul OriginalPaper 16 October 2008 Pages: 235 - 258
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs Steven NoelSushil Jajodia OriginalPaper 16 September 2008 Pages: 259 - 275
Spatial Domains for the Administration of Location-based Access Control Policies Maria Luisa DamianiElisa BertinoClaudio Silvestri OriginalPaper 19 September 2008 Pages: 277 - 302
Decentralized Access Control Management for Network Configuration Ludwig SeitzGöran SelanderBabak Sadighi OriginalPaper 11 September 2008 Pages: 303 - 316
Pervasive Management for Ubiquitous Networks and Services—Report on NOMS 2008 Carlos Becker WestphallMarcus BrunnerMehmet Ulema Report 25 September 2008 Pages: 317 - 321
Report of the 2nd Workshop on Autonomic Communications and Network Management (ACNM 2008) Raouf BoutabaMarcus BrunnerLisandro Zambenedetti Granville Report 14 September 2008 Pages: 323 - 324