Journal: Inf. Sec. Techn. Report

Volume 17, Issue 4

131 -- 147Safaa Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro. Semantic analysis of role mining results and shadowed roles detection
148 -- 172Anne Baumgrass, Mark Strembeck. Bridging the gap between role mining and role engineering via migration guides
173 -- 184Jason L. Wright, Miles McQueen, Lawrence Wellman. Analyses of two end-user software vulnerability exposure metrics (extended version)
185 -- 198Moritz Riesner, Michael Netter, Günther Pernul. Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments
199 -- 209Daniel Feledi, Stefan Fenz, Lukas Lechner. Toward web-based information security knowledge sharing
210 -- 226Amir Herzberg, Haya Shulman. Oblivious and fair server-aided two-party computation
227 -- 238Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar Weippl. InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
239 -- 252Thomas Plos, Christian Maierhofer. On measuring the parasitic backscatter of sensor-enabled UHF RFID tags

Volume 17, Issue 3

45 -- 0Ioannis G. Askoxylakis, Mark Manulis, Joachim Posegga. Security and privacy for digital ecosystems
46 -- 57Sherman S. M. Chow, Man Ho Au, Willy Susilo. Server-aided signatures verification secure against collusion attack
58 -- 70Nikolaos E. Petroulakis, Elias Z. Tragos, Alexandros G. Fragkiadakis, George Spanoudakis. A lightweight framework for secure life-logging in smart environments
71 -- 80Daniel Schreckling, Johannes Köstler, Matthias Schaff. Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android
81 -- 92Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier. HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems
93 -- 104Luigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti. SmartK: Smart cards in operating systems at kernel level
105 -- 116Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer. Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications
117 -- 128Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder. Secure computations on non-integer values with applications to privacy-preserving sequence analysis

Volume 17, Issue 1-2

1 -- 8Vladimir Jirasek. Practical application of information security models
9 -- 18Simon Walker. Economics and the cyber challenge
19 -- 25Guy Bunker. Technology is not enough: Taking a holistic view for information assurance
26 -- 35Anika Pflug, Daniel Hartung, Christoph Busch. Feature extraction from vein images using spatial information and chain codes
36 -- 43Patrick Bours. Continuous keystroke dynamics: A different perspective towards biometric evaluation
44 -- 0Ethel Quayle, Max Taylor. Corrigendum to "Social networking as a nexus for engagement and exploitation of young people" [Inform Secur Tech Rep 16 (2) (2011) 44-50]