Abstract is missing.
- DBMask: Fine-Grained Access Control on Encrypted Relational DatabasesMuhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino. 1-11 [doi]
- Differentially-Private Mining of Moderately-Frequent High-Confidence Association RulesMihai Maruseac, Gabriel Ghinita. 13-24 [doi]
- DetAnom: Detecting Anomalous Database Transactions by InsidersSyed Rafiul Hussain, Asmaa Sallam, Elisa Bertino. 25-35 [doi]
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android ApplicationsYury Zhauniarovich, Maqsood Ahmad, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci. 37-48 [doi]
- Dimensions of Risk in Mobile Applications: A User StudyZach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu. 49-60 [doi]
- SemaDroid: A Privacy-Aware Sensor Management Framework for SmartphonesZhi Xu, Sencun Zhu. 61-72 [doi]
- Collecting, Analyzing and Responding to Enterprise Scale DNS EventsWilliam Horne. 73 [doi]
- CoinParty: Secure Multi-Party Mixing of BitcoinsJan Henrik Ziegeldorf, Fred Grossmann, Martin Henze, Nicolas Inden, Klaus Wehrle. 75-86 [doi]
- The BORG: Nanoprobing Binaries for Buffer OverreadsMatthias Neugschwandtner, Paolo Milani Comparetti, István Haller, Herbert Bos. 87-97 [doi]
- How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera ServiceZhongwen Zhang, Peng Liu, Ji Xiang, Jiwu Jing, Lingguang Lei. 99-110 [doi]
- On the Character of Phishing URLs: Accurate and Robust Statistical Learning ClassifiersRakesh Verma, Keith Dyer. 111-122 [doi]
- Content Level Access Control for OpenStack Swift StorageProsunjit Biswas, Farhan Patwa, Ravi S. Sandhu. 123-126 [doi]
- Pleco and Plectron - Two Provably Secure Password Hashing AlgorithmsBo Zhu, Xinxin Fan, Guang Gong. 127-129 [doi]
- Secure Information and Resource Sharing in CloudYun Zhang, Ram Krishnan, Ravi S. Sandhu. 131-133 [doi]
- One Thing Leads to Another: Credential Based Privilege EscalationPeter Snyder, Chris Kanich. 135-137 [doi]
- Toward De-Anonymizing Bitcoin by Mapping Users LocationJules Dupont, Anna Cinzia Squicciarini. 139-141 [doi]
- Epidemic Behavior of Negative Users in Online Social SitesCong Liao, Anna Cinzia Squicciarini, Christopher Griffin. 143-145 [doi]
- Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel ComputingXiaokui Shu, Jing Zhang, Danfeng Yao, Wu-chun Feng. 147-149 [doi]
- Information Sharing and User Privacy in the Third-party Identity Management LandscapeAnna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri. 151-153 [doi]
- Practical Exploit Generation for Intent Message Vulnerabilities in AndroidDaniele Gallingani, Rigel Gjomemo, V. N. Venkatakrishnan, Stefano Zanero. 155-157 [doi]
- A Network Security Game ModelVivek Shandilya, Sajjan G. Shiva. 159-161 [doi]
- CryptStream: Cryptographic Access Controls for Streaming DataCory Thoma, Adam J. Lee, Alexandros Labrinidis. 163-165 [doi]
- ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public CloudLei Xu, Xinwen Zhang, Xiaoxin Wu, Weidong Shi. 167-169 [doi]
- BigGate: Access Control Framework for Outsourced Key-Value StoresErman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy. 171-182 [doi]
- Virtual Resource Orchestration Constraints in Cloud Infrastructure as a ServiceKhalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu. 183-194 [doi]
- Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduceFang Liu, Xiaokui Shu, Danfeng Yao, Ali R. Butt. 195-206 [doi]
- Identifying and Understanding Self-Checksumming Defenses in SoftwareJing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su. 207-218 [doi]
- Robust Fingerprinting for Relocatable CodeIrfan Ahmed, Vassil Roussev, Aisha Ali Gombe. 219-229 [doi]
- Software-Based Protection against ChangewareSebastian Banescu, Alexander Pretschner, Dominic Battré, Stéfano Cazzulani, Robert Shield, Greg Thompson. 231-242 [doi]
- Aligning Security and Business Objectives for Process-Aware Information SystemsGünter Karjoth. 243 [doi]
- A Dynamic Approach to Detect Anomalous Queries on Relational DatabasesMohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu. 245-252 [doi]
- Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It RightSteven Van Acker, Daniel Hausknecht, Wouter Joosen, Andrei Sabelfeld. 253-262 [doi]
- Database Fragmentation with Confidentiality Constraints: A Graph Search ApproachXiaofeng Xu, Li Xiong, Jinfei Liu. 263-270 [doi]
- Distributed Search over Encrypted Big DataMehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu. 271-278 [doi]
- Big Data Security and PrivacyBhavani M. Thuraisingham. 279-280 [doi]
- Towards Server-side Repair for Erasure Coding-based Distributed Storage SystemsBo Chen, Anil Kumar Ammula, Reza Curtmola. 281-288 [doi]
- Combining ORAM with PIR to Minimize Bandwidth CostsJonathan Dautrich, Chinya Ravishankar. 289-296 [doi]
- Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic AnalysisMauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde. 297-304 [doi]
- Securing ARP From the Ground UpJing (Dave) Tian, Kevin R. B. Butler, Patrick Drew McDaniel, Padma Krishnaswamy. 305-312 [doi]
- Tunably-Oblivious Memory: Generalizing ORAM to Enable Privacy-Efficiency TradeoffsJonathan Dautrich, Chinya Ravishankar. 313-324 [doi]
- HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure VulnerabilitiesJason Gionta, William Enck, Peng Ning. 325-336 [doi]
- The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor NetworksKadhim Hayawi, Alireza Mortezaei, Mahesh V. Tripunitara. 337-348 [doi]