1 | -- | 15 | Omar Banimelhem, Lo'ai Ali Tawalbeh, Moad Mowafi, Mohammed Al-Batati. A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm |
16 | -- | 35 | Daniela Simic-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer, Alexander Roßnagel. Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA |
36 | -- | 52 | Esraa Omran, Tyrone Grandison, David Nelson, Albert Bokma. A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain |
53 | -- | 67 | Michele Tomaiuolo. dDelega: Trust Management for Web Services |