The following topics are dealt with: trust model and trust management; reputation management; privacy and access control; failure detection and attack prevention; authentication and authorization; security algorithm; software security; e-auction and e-voting protocol; dependability in distributed and ubiquitous computing; anomaly and intrusion detection; real-time system and sensor network; RFID techniques; security issue in business management; Web, XML, content management; security policies; fault-tolerant distributed computing; event-based system; information security; and security in e-learning