Abstract is missing.
- Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email CampaignsMina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli. 3-19 [doi]
- Integrating Privacy and Safety Criteria into Planning TasksAnna Lavygina, Alessandra Russo, Naranker Dulay. 20-36 [doi]
- Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud EnvironmentsTeemu Kanstrén, Antti Evesti. 37-51 [doi]
- A Declarative Framework for Specifying and Enforcing Purpose-Aware PoliciesRiccardo De Masellis, Chiara Ghidini, Silvio Ranise. 55-71 [doi]
- How to Trust the Re-use of DataErisa Karafili, Hanne Riis Nielson, Flemming Nielson. 72-88 [doi]
- Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric BusinessChristian Zimmermann, Claus-Georg Nolte. 89-104 [doi]
- The AC-Index: Fast Online Detection of Correlated AlertsAndrea Pugliese, Antonino Rullo, Antonio Piccolo. 107-122 [doi]
- Intrusion Detection System for Applications Using Linux ContainersAmr S. Abed, Charles Clancy, David S. Levy. 123-135 [doi]
- SUDUTA: Script UAF Detection Using Taint AnalysisJohn Galea, Mark Vella. 136-151 [doi]
- Two-Factor Authentication for the Bitcoin ProtocolChristopher Mann, Daniel Loebenberger. 155-171 [doi]
- Private Proximity Testing on Steroids: An NTRU-based ProtocolConstantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche. 172-184 [doi]
- Selecting a New Key Derivation Function for Disk EncryptionMilan Broz, Vashek Matyás. 185-199 [doi]
- It's My Privilege: Controlling Downgrading in DC-LabelsLucas Waye, Pablo Buiras, Dan King, Stephen Chong, Alejandro Russo. 203-219 [doi]
- Obligations in PTaCLJason Crampton, Conrad Williams. 220-235 [doi]
- Content and Key Management to Trace Traitors in Broadcasting ServicesKazuto Ogawa, Goichiro Hanaoka, Hideki Imai. 236-252 [doi]
- In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical SecurityAna Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini. 255-264 [doi]
- A Socio-Technical Investigation into Smartphone SecurityMelanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz. 265-273 [doi]
- A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and UsersTatyana Ryutov, Michael D. Orosz, James Blythe, Detlof von Winterfeldt. 274-282 [doi]
- Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security RisksPankaj Pandey, Steven De Haes. 283-292 [doi]