Abstract is missing.
- Secure and efficient proof of storage with deduplicationQingji Zheng, Shouhuai Xu. 1-12 [doi]
- Practical oblivious storageMichael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia. 13-24 [doi]
- SENTINEL: securing database from logic flaws in web applicationsXiaowei Li 0003, Wei Yan, Yuan Xue. 25-36 [doi]
- Stalking online: on user privacy in social networksYuhao Yang, Jonathan Lutes, FengJun Li, Bo Luo, Peng Liu 0005. 37-48 [doi]
- Measuring query privacy in location-based servicesXihui Chen, Jun Pang. 49-60 [doi]
- Revisiting link privacy in social networksSuhendry Effendy, Roland H. C. Yap, Felix Halim. 61-70 [doi]
- On practical specification and enforcement of obligationsNinghui Li, HaiNing Chen, Elisa Bertino. 71-82 [doi]
- Deriving implementation-level policies for usage control enforcementPrachi Kumari, Alexander Pretschner. 83-94 [doi]
- Discovering access-control misconfigurations: new approaches and evaluation methodologiesLujo Bauer, Yuan Liang, Michael K. Reiter, Chad Spensky. 95-104 [doi]
- Comparison-based encryption for fine-grained access control in cloudsYan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Hong-Jia Zhao. 105-116 [doi]
- Relationship-based access control: its expression and enforcement through hybrid logicGlenn Bruns, Philip W. L. Fong, Ida Siahaan, Michael Huth. 117-124 [doi]
- Bounding trust in reputation systems with incomplete informationXi Gong, Ting Yu, Adam J. Lee. 125-132 [doi]
- The privacy in the time of the internet: secrecy vs transparencyMurillo Pontual, Andreas Gampe, Omar Chowdhury, Bazoumana Kone, Md. Shamim Ashik, William H. Winsborough. 133-140 [doi]
- Cookie-based privacy issues on google servicesVincent Toubiana, Vincent Verdot, Benoit Christophe. 141-148 [doi]
- Refinement-based design of a group-centric secure information sharing modelWanying Zhao, Jianwei Niu, William H. Winsborough. 149-156 [doi]
- Risk-based security decisions under uncertaintyIan Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo. 157-168 [doi]
- Quantitative access control with partially-observable Markov decision processesFabio Martinelli, Charles Morisset. 169-180 [doi]
- Role engineering: from theory to practiceNino Vincenzo Verde, Jaideep Vaidya, Vijay Atluri, Alessandro Colantonio. 181-192 [doi]
- Privacy streamliner: a two-stage approach to improving algorithm efficiencyWen Ming Liu, Lingyu Wang. 193-204 [doi]
- Privacy analysis using ontologiesMartin Kost, Johann Christoph Freytag. 205-216 [doi]
- S2A: secure smart household appliancesYuxin Chen, Bo Luo. 217-228 [doi]
- Protecting health information on mobile devicesMusheer Ahmed, Mustaque Ahamad. 229-240 [doi]
- Efficient run-time solving of RBAC user authorization queries: pushing the envelopeAlessandro Armando, Silvio Ranise, Fatih Turkmen, Bruno Crispo. 241-248 [doi]
- A model-theoretic approach to data anonymity and inference controlKonstantine Arkoudas, Akshay Vashist. 249-256 [doi]
- Towards end-to-end secure content storage and delivery with public cloudHuijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin Wu, Yonggang Wen. 257-266 [doi]
- SecDS: a secure EPC discovery service system in EPCglobal networkJie Shi, Darren Sim, Yingjiu Li, Robert Huijie Deng. 267-274 [doi]
- Identifying native applications with high assuranceHussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura. 275-282 [doi]
- An information theoretic privacy and utility measure for data sanitization mechanismsMina Askari, Reihaneh Safavi-Naini, Ken Barker. 283-294 [doi]
- SWIPE: eager erasure of sensitive data in large scale systems softwareKalpana Gondi, Prithvi Bisht, Praveen Venkatachari, A. Prasad Sistla, V. N. Venkatakrishnan. 295-306 [doi]
- Leakage-free redactable signaturesAshish Kundu, Mikhail J. Atallah, Elisa Bertino. 307-316 [doi]
- Detecting repackaged smartphone applications in third-party android marketplacesWu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning. 317-326 [doi]