Abstract is missing.
- Generalizing PIR for Practical Private Retrieval of Public DataShiyuan Wang, Divyakant Agrawal, Amr El Abbadi. 1-16 [doi]
- A Logic of PrivacySteve Barker, Valerio Genovese. 17-32 [doi]
- Understanding Privacy Risk of Publishing Decision TreesZutao Zhu, Wenliang Du. 33-48 [doi]
- Secure Outsourcing of DNA Searching via Finite AutomataMarina Blanton, Mehrdad Aliasgari. 49-64 [doi]
- A Labelling System for Derived Data ControlEnrico Scalavino, Vaibhav Gowadia, Emil C. Lupu. 65-80 [doi]
- On the Identification of Property Based Generalizations in Microdata AnonymizationRinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley. 81-96 [doi]
- Role Mining in the Presence of NoiseJaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu. 97-112 [doi]
- Distributed and Secure Access Control in P2P DatabasesAngela Bonifati, Ruilin Liu, Hui (Wendy) Wang. 113-129 [doi]
- Constructing Key Assignment Schemes from Chain PartitionsJason Crampton, Rosli Daud, Keith M. Martin. 130-145 [doi]
- ::::f::::Query: SPARQL Query Rewriting to Enforce Data ConfidentialitySaid Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci. 146-161 [doi]
- Efficient Inference Control for Open Relational QueriesJoachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner. 162-176 [doi]
- Query Racing: Fast Completeness Certification of Query ResultsBernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco. 177-192 [doi]
- Mining Likely Properties of Access Control Policies via Association Rule MiningJeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay. 193-208 [doi]
- Scalable and Efficient Reasoning for Enforcing Role-Based Access ControlTyrone Cadenhead, Murat Kantarcioglu, Bhavani M. Thuraisingham. 209-224 [doi]
- Enforcing Request Integrity in Web ApplicationsKarthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin. 225-240 [doi]
- Using Trust-Based Information Aggregation for Predicting Security Level of SystemsSiv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray. 241-256 [doi]
- Modelling Dynamic Trust with Property Based Attestation in Trusted PlatformsAarthi Nagarajan, Vijay Varadharajan. 257-272 [doi]
- Towards Privacy-Enhancing Identity Management in Mashup-Providing PlatformsJan Zibuschka, Matthias Herbert, Heiko Rossnagel. 273-286 [doi]
- An Access Control Model for Web DatabasesAhlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene-Ayachi. 287-294 [doi]
- Modelling Dynamic Access Control Policies for Web-Based Collaborative SystemsHasan Qunoo, Mark Ryan. 295-302 [doi]
- Evaluating the Risk of Adopting RBAC RolesAlessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde. 303-310 [doi]
- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of ProvenanceAmril Syalim, Takashi Nishide, Kouichi Sakurai. 311-318 [doi]
- When ABE Meets RSSYu Chen, Hyun-Sung Kim, Jian-bin Hu, Zhong Chen. 319-326 [doi]
- ::::PriMan:::: : A Privacy-Preserving Identity FrameworkKristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart De Decker. 327-334 [doi]
- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning ApproachAlex Hai Wang. 335-342 [doi]
- Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New ApproachRamaswamy Chandramouli. 343-349 [doi]
- A Secure RFID Ticket System for Public TransportKun Peng, Feng Bao. 350-357 [doi]
- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication ProtocolsSuratose Tritilanunt. 358-365 [doi]
- Secure Location Verification - A Security Analysis of GPS Signal AuthenticationGeorg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar. 366-373 [doi]