Abstract is missing.
- Data protection in outsourcing scenarios: issues and directionsPierangela Samarati, Sabrina De Capitani di Vimercati. 1-14 [doi]
- A lattice-based approach to mashup securityJonas Magazinius, Aslan Askarov, Andrei Sabelfeld. 15-23 [doi]
- Towards publishing recommendation data with predictive anonymizationChih-Cheng Chang, Brian Thompson, Hui (Wendy) Wang, Danfeng Yao. 24-35 [doi]
- Restoring compromised privacy in micro-data disclosureLei Zhang 0004, Alexander Brodsky, Sushil Jajodia. 36-47 [doi]
- Securely outsourcing linear algebra computationsMikhail J. Atallah, Keith B. Frikken. 48-59 [doi]
- Attribute-based signature and its applicationsJin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren. 60-69 [doi]
- Dynamic fully forward-secure group signaturesBenoît Libert, Moti Yung. 70-81 [doi]
- Identity-based encryption based on DHIESYu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen. 82-88 [doi]
- Region-based BGP announcement filtering for improved BGP securityFernando Sanchez, Zhenhai Duan. 89-100 [doi]
- Fast-flux service network detection based on spatial snapshot mechanism for delay-free detectionSi-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee. 101-111 [doi]
- Securing wireless sensor networks against large-scale node capture attacksTuan Manh Vu, Reihaneh Safavi-Naini, Carey Williamson. 112-123 [doi]
- Preventing drive-by download via inter-module communication monitoringChengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye. 124-134 [doi]
- A solution for the automated detection of clickjacking attacksMarco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel. 135-144 [doi]
- PAriCheck: an efficient pointer arithmetic checker for C programsYves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar, Frank Piessens, Wouter Joosen. 145-156 [doi]
- An opportunistic authority evaluation scheme for data security in crisis management scenariosEnrico Scalavino, Giovanni Russello, Rudi Ball, Vaibhav Gowadia, Emil C. Lupu. 157-168 [doi]
- Effective trust management through a hybrid logical and relational approachAdam J. Lee, Ting Yu, Yann Le Gall. 169-179 [doi]
- Toward practical authorization-dependent user obligation systemsMurillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin. 180-191 [doi]
- Cap unification: application to protocol security modulo homomorphic encryptionSiva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch. 192-203 [doi]
- SSLock: sustaining the trust on entities brought by SSLAdonis P. H. Fung, K.-W. Cheung. 204-213 [doi]
- Computationally secure two-round authenticated message exchangeKlaas Ole Kürtz, Henning Schnoor, Thomas Wilke. 214-225 [doi]
- Bureaucratic protocols for secure two-party sorting, selection, and permutingGuan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu. 226-237 [doi]
- A logic for authorization provenanceJinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu. 238-249 [doi]
- Risk-based access control systems built on fuzzy inferencesQun Ni, Elisa Bertino, Jorge Lobo. 250-260 [doi]
- Attribute based data sharing with attribute revocationShucheng Yu, Cong Wang, Kui Ren, Wenjing Lou. 261-270 [doi]
- binOb+: a framework for potent and stealthy binary obfuscationByoungyoung Lee, Yuna Kim, Jong Kim. 271-281 [doi]
- Secure provenance: the essential of bread and butter of data forensics in cloud computingRongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen. 282-292 [doi]
- RunTest: assuring integrity of dataflow processing in cloud computing infrastructuresJuan Du, Wei Wei, Xiaohui Gu, Ting Yu. 293-304 [doi]
- K-anonymous association rule hidingZutao Zhu, Wenliang Du. 305-309 [doi]
- Controlling data disclosure in computational PIR protocolsNing Shang, Gabriel Ghinita, Yongbin Zhou, Elisa Bertino. 310-313 [doi]
- Cryptographic role-based security mechanisms based on role-key hierarchyYan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang. 314-319 [doi]
- PriMa: an effective privacy protection mechanism for social networksAnna Cinzia Squicciarini, Federica Paci, Smitha Sundareswaran. 320-323 [doi]
- Oblivious enforcement of hidden information release policiesBrian Wongchaowart, Adam J. Lee. 324-327 [doi]
- Apex: extending Android permission model and enforcement with user-defined runtime constraintsMohammad Nauman, Sohail Khan, Xinwen Zhang. 328-332 [doi]
- A hotspot-based protocol for attack traceback in mobile ad hoc networksHung-Yuan Hsu, Sencun Zhu, Ali R. Hurson. 333-336 [doi]
- Practical ID-based encryption for wireless sensor networkCheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng. 337-340 [doi]
- A game theoretic model for digital identity and trust in online communitiesTansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas. 341-344 [doi]
- Scene tagging: image-based CAPTCHA using image composition and object relationshipsPeter Matthews, Cliff Changchun Zou. 345-350 [doi]