Abstract is missing.
- Data Analytics: Understanding Human Behavior based on Mobile Network DataLuciano Franceschina. 1 [doi]
- Co-location Resistant Strategy with Full Resources OptimizationMouhebeddine Berrima, Aïcha Katajina Nasr, Narjes Ben Rajeb. 3-10 [doi]
- Executing Boolean Queries on an Encrypted Bitmap IndexMohamed Ahmed Abdelraheem, Christian Gehrmann, Malin Lindström, Christian Nordahl. 11-22 [doi]
- Poly-Logarithmic Range Queries on Encrypted Data with Small LeakageFlorian Hahn, Florian Kerschbaum. 23-34 [doi]
- Encrypting Analytical Web ApplicationsBenny Fuhry, Walter Tighzert, Florian Kerschbaum. 35-46 [doi]
- Stratum Filtering: Cloud-based Detection of Attack SourcesAmir Herzberg, Haya Shulman, Michael Waidner. 47-48 [doi]
- Oblivious RAM as a Substrate for Cloud Storage - The Leakage Challenge AheadMarc Sánchez Artigas. 49-53 [doi]
- Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud EnvironmentsMeryeme Ayache, Mohammed Erradi, Bernd Freisleben, Ahmed Khoumsi. 55-59 [doi]
- On Information Leakage in Deduplicated Storage SystemsHubert Ritzdorf, Ghassan Karame, Claudio Soriente, Srdjan Capkun. 61-72 [doi]
- Message-Locked Proofs of Retrievability with Secure DeduplicationDimitrios Vasilopoulos, Melek Önen, Kaoutar Elkhiyaoui, Refik Molva. 73-83 [doi]
- Generic Efficient Dynamic Proofs of RetrievabilityMohammad Etemad, Alptekin Küpçü. 85-96 [doi]
- Assured Deletion in the Cloud: Requirements, Challenges and Future DirectionsKopo M. Ramokapane, Awais Rashid, Jose M. Such. 97-108 [doi]