List of Figures. List of Tables. Preface. Contributing Authors. Part Invited Talks. 1. E-Commerce No Silver Bullet; A.K. Ghosh. 2. Technical Enforcement of Informational Assurances; J. Biskup. Part Workflow. 3. Analyzing the Safety of Workflow Authorization Models; W.-K. Huang, V. Atluri. 4. Rules and Patterns for Security in Workflow Systems; S. Castano, M.G. Fugini. Part Privacy. 5. An information-flow model for Privacy (InfoPriv); L.C.J. Dreyer, M.S. Olivier. Part Policy Modeling. 6. Security Policies in Replicated and Autonomous Databases; E. Gudes, M.S. Olivier. 7. Programmable Security for Object-Oriented Systems; J. Hale, et al. Part Mediation. 8. Secure Requirements and Design; J. Biskup, et al. Part Information Warfare Defense. 9. Reconstructing the Database after Electronic Attacks; B. Panda, J. Giordano. Part Multilevel Security. 10. Version Management in the STAR MLS Database System; R. Sripada, T.F. Keefe. 11. a support tool to manage multilevel documents; J. Carrère, et al. Part Role-based Access Controls. 12. Using Role-Templates for Handling Recurring Role Structures; W. Essmayr, et al. 13. Role Based Security and Java; D. Smarkusky, et al. Part Mobile Databases. 14. Security Issues in Mobile Database Access; A. Lubinski. Part 15. Bayesian Methods Applied to the Database Inference Problem; L.W. Chang, I.S. Moskowitz. 16. The Design and Implementation of a Data Level Database Inference Detection System; R.W. Yip, K.N. Levitt. Part Panel. 17. Security and Privacy Issues for the World Wide Panel Discussion; B. Thuraisingham, et al. Part Discussion Summary. 18. Workshop Summary; W. Atluri, D.L. Spooner. Index.