Abstract is missing.
- For some eyes only: protecting online information sharingFilipe Beato, Iulia Ion, Srdjan Capkun, Bart Preneel, Marc Langheinrich. 1-12 [doi]
- Do online social network friends still threaten my privacy?Sebastian Labitzke, Florian Werling, Jens Mittag, Hannes Hartenstein. 13-24 [doi]
- Geolocation of data in the cloudMark Gondree, Zachary N. J. Peterson. 25-36 [doi]
- Exploring dependency for query privacy protection in location-based servicesXihui Chen, Jun Pang. 37-48 [doi]
- Expression rewriting for optimizing secure computationFlorian Kerschbaum. 49-58 [doi]
- Efficient discovery of de-identification policy options through a risk-utility frontierWeiyi Xia, Raymond Heatherly, Xiaofeng Ding, Jiuyong Li, Bradley Malin. 59-70 [doi]
- Data usage control enforcement in distributed systemsFlorian Kelbert, Alexander Pretschner. 71-82 [doi]
- The usability of truecrypt, or how i learned to stop whining and fix an interfaceSumeet Gujrati, Eugene Y. Vasserman. 83-94 [doi]
- Privacy by design: a formal framework for the analysis of architectural choicesDaniel Le Métayer. 95-104 [doi]
- Comparative eye tracking of experts and novices in web single sign-onMajid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila. 105-116 [doi]
- JStill: mostly static detection of obfuscated malicious JavaScript codeWei Xu, Fangfang Zhang, Sencun Zhu. 117-128 [doi]
- TamperProof: a server-agnostic defense for parameter tampering attacks on web applicationsNazari Skrupsky, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck. 129-140 [doi]
- Cross-layer detection of malicious websitesLi Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye. 141-152 [doi]
- A file provenance systemSalmin Sultana, Elisa Bertino. 153-156 [doi]
- Enhancing performance of searchable encryption in cloud computingRazvan Rughinis. 157-160 [doi]
- A fine-grained access control model for key-value systemsDevdatta Kulkarni. 161-164 [doi]
- Emulating internet topology snapshots in deterlabGraciela Perera, Nathan Miller, John Mela, Michael P. McGarry, Jaime C. Acosta. 165-168 [doi]
- Persea: a sybil-resistant social DHTMahdi N. Al-Ameen, Matthew Wright. 169-172 [doi]
- A study of user password strategy for multiple accountsS. M. Taiabul Haque, Matthew Wright, Shannon Scielzo. 173-176 [doi]
- Authenticating spatial skyline queries with low communication overheadHans Lo, Gabriel Ghinita. 177-180 [doi]
- An efficient certificateless cryptography scheme without pairingSeung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino. 181-184 [doi]
- Fast, scalable detection of "Piggybacked" mobile applicationsWu Zhou, Yajin Zhou, Michael C. Grace, Xuxian Jiang, Shihong Zou. 185-196 [doi]
- Sweetening android lemon markets: measuring and combating malware in application marketplacesTimothy Vidas, Nicolas Christin. 197-208 [doi]
- AppsPlayground: automatic security analysis of smartphone applicationsVaibhav Rastogi, Yan Chen, William Enck. 209-220 [doi]
- AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end usersSanae Rosen, Zhiyun Qian, Zhuoqing Morley Mao. 221-232 [doi]
- Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizerChristoph Busold, Ahmed Taha, Christian Wachsmann, Alexandra Dmitrienko, Hervé Seudie, Majid Sobhani, Ahmad-Reza Sadeghi. 233-242 [doi]
- FENCE: continuous access control enforcement in dynamic data stream environmentsRimma V. Nehme, Hyo-Sang Lim, Elisa Bertino. 243-254 [doi]
- Mining parameterized role-based policiesZhongyuan Xu, Scott D. Stoller. 255-266 [doi]
- I see we still like CRonnie L. Killough. 267-268 [doi]
- A new approach for delegation in usage controlXiao Liang Hu, Sylvia L. Osborn. 269-276 [doi]
- Towards secure provenance-based access control in cloud environmentsAdam M. Bates, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler. 277-284 [doi]
- Engineering access control policies for provenance-aware systemsLianshan Sun, Jaehong Park, Ravi S. Sandhu. 285-292 [doi]
- Linking anonymous location traces through driving characteristicsBin Zan, Zhanbo Sun, Marco Gruteser, Xuegang Ban. 293-300 [doi]
- Insured access: an approach to ad-hoc information sharing for virtual organizationsNaoki Tanaka, Marianne Winslett, Adam J. Lee, David K. Y. Yau, Feng Bao. 301-308 [doi]
- Mediums: visual integrity preserving frameworkTongbo Luo, Xing Jin, Wenliang Du. 309-316 [doi]
- Effect of grammar on security of long passwordsAshwini Rao, Birendra Jha, Gananand Kini. 317-324 [doi]
- Accepting the inevitable: factoring the user into home computer securityMalgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele E. Howe, Zinta Byrne. 325-332 [doi]
- All your browser-saved passwords could belong to us: a security analysis and a cloud-based new designRui Zhao, Chuan Yue. 333-340 [doi]
- iBigTable: practical data integrity for bigtable in public cloudWei Wei, Ting Yu, Rui Xue. 341-352 [doi]
- Multi-user dynamic proofs of data possession using trusted hardwareStephen R. Tate, Roopa Vishwanathan, Lance Everhart. 353-364 [doi]
- Adaptive data protection in distributed systemsAnna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino. 365-376 [doi]
- Towards self-repairing replication-based storage systems using untrusted cloudsBo Chen, Reza Curtmola. 377-388 [doi]