Abstract is missing.
- The challenge of data and application security and privacy (DASPY): are we up to itRavi S. Sandhu. 1-2 [doi]
- Key dependent message security: recent results and applicationsTal Malkin, Isamu Teranishi, Moti Yung. 3-12 [doi]
- Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architecturesKari Kostiainen, Elena Reshetova, Jan-Erik Ekberg, N. Asokan. 13-24 [doi]
- Towards active detection of identity clone attacks on online social networksLei Jin, Hassan Takabi, James B. D. Joshi. 27-38 [doi]
- Virtual private social networksMauro Conti, Arbnor Hasani, Bruno Crispo. 39-50 [doi]
- A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networksBarbara Carminati, Elena Ferrari, Sandro Morasca, Davide Taibi. 51-62 [doi]
- Detection of anomalous insiders in collaborative environments via relational analysis of access logsYou Chen, Bradley Malin. 63-74 [doi]
- LeakProber: a framework for profiling sensitive data leakage pathsJunfeng Yu, Shengzhi Zhang, Peng Liu, Zhitang Li. 75-84 [doi]
- Distributed data usage control for web applications: a social network implementationPrachi Kumari, Alexander Pretschner, Jonas Peschla, Jens-Michael Kuhn. 85-96 [doi]
- MyABDAC: compiling XACML policies for attribute-based database access controlSonia Jahid, Carl A. Gunter, Imranul Hoque, Hamed Okhravi. 97-108 [doi]
- Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered setsDaniel A. Mayer, Dominik Teubert, Susanne Wetzel, Ulrike Meyer. 109-120 [doi]
- An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC)Marko Komlenovic, Mahesh V. Tripunitara, Toufik Zitouni. 121-132 [doi]
- A language for provenance access controlTyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani M. Thuraisingham. 133-144 [doi]
- Non-interactive editable signatures for assured data provenanceHaifeng Qian, Shouhuai Xu. 145-156 [doi]
- Identifying a critical threat to privacy through automatic image classificationDavid Lorenzi, Jaideep Vaidya. 157-168 [doi]
- k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equationsMummoorthy Murugesan, Wei Jiang, Ahmet Erhan Nergiz, Serkan Uzunbaz. 169-178 [doi]
- Mixture of gaussian models and bayes error under differential privacyBowei Xi, Murat Kantarcioglu, Ali Inan. 179-190 [doi]
- Relationship-based access control: protection model and policy languagePhilip W. L. Fong. 191-202 [doi]
- Enforcing physically restricted access control for remote dataMichael S. Kirkpatrick, Sam Kerr. 203-212 [doi]
- Towards defining semantic foundations for purpose-based privacy policiesMohammad Jafari, Philip W. L. Fong, Reihaneh Safavi-Naini, Ken Barker, Nicholas Paul Sheppard. 213-224 [doi]
- Practical policy patternsDan Thomsen. 225-230 [doi]
- The optimization of situational awareness for insider threat detectionKenneth Brancik, Gabriel Ghinita. 231-236 [doi]
- Fair and dynamic proofs of retrievabilityQingji Zheng, Shouhuai Xu. 237-248 [doi]
- RASP: efficient multidimensional range query on attack-resilient encrypted databasesKeke Chen, Ramakanth Kavuluru, Shumin Guo. 249-260 [doi]
- Privacy-preserving activity scheduling on mobile devicesIgor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi. 261-272 [doi]
- Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctionsMichael T. Goodrich, Florian Kerschbaum. 273-282 [doi]
- Panel: research agenda for data and application securityXiaoyang Sean Wang. 283-284 [doi]