Abstract is missing.
- TrackBack spam: abuse and preventionElie Bursztein, Peifung E. Lam, John C. Mitchell. 3-10 [doi]
- Secure file system services for web 2.0 applicationsFrancis Hsu, Hao Chen. 11-18 [doi]
- Browser interfaces and extended validation SSL certificates: an empirical studyRobert Biddle, Paul C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen. 19-30 [doi]
- Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifierDominik Herrmann, Rolf Wendolsky, Hannes Federrath. 31-42 [doi]
- Proofs of retrievability: theory and implementationKevin D. Bowers, Ari Juels, Alina Oprea. 43-54 [doi]
- Secure and efficient access to outsourced dataWeichao Wang, Zhiwei Li, Rodney Owens, Bharat K. Bhargava. 55-66 [doi]
- On protecting integrity and confidentiality of cryptographic file system for outsourced storageAaram Yun, Chunhui Shi, Yongdae Kim. 67-76 [doi]
- Resource management for isolation enhanced cloud servicesHimanshu Raj, Ripal Nathuji, Abhishek Singh, Paul England. 77-84 [doi]
- Controlling data in the cloud: outsourcing computation without outsourcing controlRichard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina. 85-90 [doi]
- Managing security of virtual machine images in a cloud environmentJinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Peng Ning. 91-96 [doi]
- Cloud security is not (just) virtualization security: a short paperMihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni. 97-102 [doi]
- Patient controlled encryption: ensuring privacy of electronic medical recordsJosh Benaloh, Melissa Chase, Eric Horvitz, Kristin Lauter. 103-114 [doi]
- Secure anonymous database searchMariana Raykova 0001, Binh Vo, Steven M. Bellovin, Tal Malkin. 115-126 [doi]
- Securing elastic applications on mobile devices for cloud computingXinwen Zhang, Joshua Schiffman, Simon Gibbs, Anugeetha Kunjithapatham, Sangoh Jeong. 127-134 [doi]