Abstract is missing.
- Post-Snowden Threat ModelsBart Preneel. 1 [doi]
- Valued Workflow Satisfiability ProblemJason Crampton, Gregory Gutin, Daniel Karapetyan. 3-13 [doi]
- Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) PoliciesJonathan Shahen, Jianwei Niu, Mahesh V. Tripunitara. 15-26 [doi]
- Automated Inference of Access Control Policies for Web ApplicationsHa-Thanh Le, Cu Duy Nguyen, Lionel C. Briand, Benjamin Hourte. 27-37 [doi]
- Commune: Shared Ownership in an Agnostic CloudClaudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun. 39-50 [doi]
- SecLoc: Securing Location-Sensitive Storage in the CloudJingwei Li, Anna Cinzia Squicciarini, Dan Lin, Shuang Liang, Chunfu Jia. 51-61 [doi]
- Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource SchedulingKhalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu. 63-74 [doi]
- A Logical Approach to Restricting Access in Online Social NetworksMarcos Cramer, Jun Pang, Yang Zhang. 75-86 [doi]
- Preventing Information Inference in Access ControlFederica Paci, Nicola Zannone. 87-97 [doi]
- On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute RetrievalJason Crampton, Charles Morisset, Nicola Zannone. 99-109 [doi]
- Challenges in Making Access Control Sensitive to the "Right" ContextsTrent Jaeger. 111 [doi]
- Relationship-Based Access Control for an Open-Source Medical Records SystemSyed Zain R. Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood. 113-124 [doi]
- Federated Access Management for Collaborative Network Environments: Framework and Case StudyCarlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, Gail-Joon Ahn. 125-134 [doi]
- Fine-Grained Business Data Confidentiality Control in Cross-Organizational TrackingWeili Han, Yin Zhang, Zeqing Guo, Elisa Bertino. 135-145 [doi]
- A Prototype to Reduce the Amount of Accessible InformationRainer Fischer. 147-149 [doi]
- A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release PoliciesAlessandro Armando, Silvio Ranise, Riccardo Traverso, Konrad Wrona. 151-155 [doi]
- Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing TechniquesMasoud Narouei, Hassan Takabi. 157-160 [doi]
- Hard Instances for Verification Problems in Access ControlNima Mousavi, Mahesh V. Tripunitara. 161-164 [doi]
- Initial Encryption of large Searchable Data Sets using HadoopFeng Wang, Mathias Kohler, Andreas Schaad. 165-168 [doi]
- Generating Secure Images for CAPTCHAs through Noise AdditionDavid Lorenzi, Pratik Chattopadhyay, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri. 169-172 [doi]
- A Logic of Trust for Reasoning about Delegation and RevocationMarcos Cramer, Diego Agustin Ambrossio, Pieter Van Hertum. 173-184 [doi]
- Towards Attribute-Based Authorisation for Bidirectional ProgrammingLionel Montrieux, Zhenjiang Hu. 185-196 [doi]
- Privacy and Access Control: How are These Two concepts Related?Anna Cinzia Squicciarini, Ting Yu. 197-198 [doi]
- Mitigating Access Control Vulnerabilities through Interactive Static AnalysisJun Zhu, Bill Chu, Heather Richter Lipford, Tyler Thomas. 199-209 [doi]
- Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction ApproachJafar Haadi Jafarian, Hassan Takabi, Hakim Touati, Ehsan Hesamifard, Mohamed Shehab. 211-220 [doi]
- SPA: Inviting Your Friends to Help Set Android AppsZeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni. 221-231 [doi]