Abstract is missing.
- Data Security Issues in Cloud ScenariosSabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. 3-10 [doi]
- Automated Border Control Systems: Biometric Challenges and Research TrendsRuggero Donida Labati, Angelo Genovese, Enrique Muñoz, Vincenzo Piuri, Fabio Scotti, Gianluca Sforza. 11-20 [doi]
- Extending Mandatory Access Control Policies in AndroidStefano Paraboschi, Enrico Bacis, Simone Mutti. 21-35 [doi]
- Reflections on the Self-service Cloud Computing ProjectVinod Ganapathy. 36-57 [doi]
- Enforcing Separation of Duty in Attribute Based Access Control SystemsSadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. 61-78 [doi]
- Modeling of Online Social Network Policies Using an Attribute-Based Access Control FrameworkPhillipa Bennett, Indrakshi Ray, Robert B. France. 79-97 [doi]
- Role Mining in the Presence of Separation of Duty ConstraintsPrasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. 98-117 [doi]
- Context-Aware Access Control in Novel Automotive HMI SystemsSimon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer, Ulrich Krämer. 118-138 [doi]
- Introducing Dynamic Identity and Access Management in OrganizationsMichael Kunz, Ludwig Fuchs, Matthias Hummer, Günther Pernul. 139-158 [doi]
- Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible RemediesGoutam Paul. 161-170 [doi]
- FlowMiner: Automatic Summarization of Library Data-Flow for Malware AnalysisTom Deering, Ganesh Ram Santhanam, Suresh Kothari. 171-191 [doi]
- SQLshield: Preventing SQL Injection Attacks by Modifying User Input DataPunit Mehta, Jigar Sharda, Manik Lal Das. 192-206 [doi]
- Assessment of an Automatic Correlation Rules GeneratorErwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk. 207-224 [doi]
- Similarity Measure for Security Policies in Service Provider SelectionYanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey, Xiaoshu Ji. 227-242 [doi]
- A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric CollaborationsAnant Pushkar, Nirnay Ghosh, Soumya K. Ghosh. 243-262 [doi]
- DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in CloudGaurav Somani, Abhinav Johri, Mohit Taneja, Utkarsh Pyne, Manoj Singh Gaur, Dheeraj Sanghi. 263-282 [doi]
- New HMAC Message Patches: Secret Patch and CrOw PatchDonghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma. 285-302 [doi]
- Search Algorithm of Precise Integral Distinguisher of Byte-Based Block CipherHaruhisa Kosuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa. 303-323 [doi]
- Plaintext Checkable SigncryptionAngsuman Das, Avishek Adhikari. 324-333 [doi]
- A New Distinguisher on Grain v1 for 106 RoundsSantanu Sarkar. 334-344 [doi]
- Functional Encryption in IoT E-Health Care SystemDhruti Sharma, Devesh Jinwala. 345-363 [doi]
- Asynchronous Error-Decodable Secret-Sharing and Its ApplicationAshish Choudhury. 364-377 [doi]
- On Anonymous Attribute Based EncryptionPayal Chaudhari, Manik Lal Das, Anish Mathuria. 378-392 [doi]
- An Automatic Inference of Minimal Security TypesDominik Bollmann, Steffen Lortz, Heiko Mantel, Artem Starostin. 395-415 [doi]
- Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor NetworkSarita Agrawal, Manik Lal Das, Anish Mathuria, Sanjay Srivastava. 419-440 [doi]
- Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio NetworksSuchismita Bhattacharjee, Ningrinla Marchang. 441-460 [doi]
- Watermark Removal Attack Extended to Forgery Against Correlation-Based Watermarking SchemesToshanlal Meenpal, A. K. Bhattacharjee. 463-479 [doi]
- Reversible Color Image Watermarking in the YCoCg-R Color SpaceAniket Roy, Rajat Subhra Chakraborty, Ruchira Naskar. 480-498 [doi]
- A Study of Web Application Firewall SolutionsStefan Prandl, Mihai Lazarescu, Duc-Son Pham. 501-510 [doi]
- Attacks on Branch Predictors: An Empirical ExplorationMoumita Das, Bhaskar Sardar, Ansuman Banerjee. 511-520 [doi]
- Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast DecryptionY. Sreenivasa Rao. 521-531 [doi]
- A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function with Less Public ValuesShyamalendu Kandar, Bibhas Chandra Dhara. 532-541 [doi]
- Robustness of Score Normalization in Multibiometric SystemsRadhey Shyam, Yogendra Narain Singh. 542-550 [doi]
- Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow ControlS. Susheel, N. V. Narendra Kumar, R. K. Shyamasundar. 551-561 [doi]
- A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor NetworksSatyajit Banerjee, Debapriyay Mukhopadhyay, Suman Roy. 562-572 [doi]
- DWT Difference Modulation Based Novel Steganographic AlgorithmImon Mukherjee, Biswajita Datta, Reeturaj Banerjee, Srijan Das. 573-582 [doi]