Abstract is missing.
- MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduceNeelam Memon, Jianhua Shao. 3-18 [doi]
- Towards Collaborative Query Planning in Multi-party Database NetworksMingyi Zhao, Peng Liu, Jorge Lobo. 19-34 [doi]
- Privacy-Preserving Range Queries from Keyword QueriesGiovanni Di Crescenzo, Abhrajit Ghosh. 35-50 [doi]
- An Administrative Model for Relationship-Based Access ControlScott D. Stoller. 53-68 [doi]
- Migrating from DAC to RBACEmre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural. 69-84 [doi]
- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution ScenariosDaniel Ricardo Dos Santos, Silvio Ranise, Luca Compagna, Serena Elisa Ponta. 85-100 [doi]
- Privacy Preserving Record Matching Using Automated Semi-trusted BrokerIbrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia. 103-118 [doi]
- Outsourceable Privacy-Preserving Power Usage Control in a Smart GridHu Chun, Kui Ren, Wei Jiang. 119-134 [doi]
- Privacy-Preserving Public Transport Ticketing SystemMilica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker. 135-150 [doi]
- Expiration and Revocation of Keys for Attribute-Based SignaturesStephen R. Tate, Roopa Vishwanathan. 153-169 [doi]
- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment AnalysisEuijin Choo, Ting Yu, Min Chi. 170-187 [doi]
- Constructing Inference-Proof Belief MediatorsJoachim Biskup, Cornelia Tadros. 188-203 [doi]
- Personalized Composition of Trustful Reputation SystemsJohannes Sänger, Christian Richthammer, André Kremser, Günther Pernul. 207-214 [doi]
- FamilyID: A Hybrid Approach to Identify Family Information from MicroblogsJamuna Gopal, Shu Huang, Bo Luo. 215-222 [doi]
- Sanitization of Call Detail Records via Differentially-Private Bloom FiltersMohammad Alaggan, Sébastien Gambs, Stan Matwin, Mohammed Tuhin. 223-230 [doi]
- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection SystemAnnanda Thavymony Rath, Jean-Noël Colin. 233-241 [doi]
- Integrating Attributes into Role-Based Access ControlQasim Mahmood Rajpoot, Christian Damsgaard Jensen, Ram Krishnan. 242-249 [doi]
- Automated Translation of End User Policies for Usage Control EnforcementPrachi Kumari, Alexander Pretschner. 250-258 [doi]
- Defensive Resource Allocations with Security Chokepoints in IPv6 NetworksAssane Gueye, Peter Mell, Richard E. Harang, Richard J. La. 261-276 [doi]
- A Topology Based Flow Model for Computing Domain ReputationIgor Mishsky, Nurit Gal-Oz, Ehud Gudes. 277-292 [doi]
- FPGuard: Detection and Prevention of Browser FingerprintingAmin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam. 293-308 [doi]
- Stream Processing with Secure Information Flow ConstraintsIndrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose F. Gamble. 311-329 [doi]
- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow PoliciesJason Crampton, Naomi Farley, Gregory Gutin, Mark Jones. 330-345 [doi]
- Inference Leakage Detection for Authorization Policies over RDF DataTarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid. 346-361 [doi]