This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...