Abstract is missing.
- On the suitability of dissemination-centric access control systems for group-centric sharingWilliam C. Garrison III, Yechen Qiao, Adam J. Lee. 1-12 [doi]
- Streamforce: outsourcing access control enforcement for stream data to the cloudsTien Tuan Anh Dinh, Anwitaman Datta. 13-24 [doi]
- Compac: enforce component-level access control in androidYifei Wang, Srinivas Hariharan, Chenxi Zhao, Jiaming Liu, Wenliang Du. 25-36 [doi]
- KameleonFuzz: evolutionary fuzzing for black-box XSS detectionFabien Duchene, Sanjay Rawat, Jean-Luc Richier, Roland Groz. 37-48 [doi]
- Automated black-box detection of access control vulnerabilities in web applicationsXiaowei Li 0003, Xujie Si, Yuan Xue. 49-60 [doi]
- PhishSafe: leveraging modern JavaScript API's for transparent and robust protectionBastian Braun, Martin Johns, Johannes Köstler, Joachim Posegga. 61-72 [doi]
- Virtualization and security: happily ever after?Dongyan Xu. 73-74 [doi]
- On protection in federated social computing systemsEbrahim Tarameshloo, Philip W. L. Fong, Payman Mohassel. 75-86 [doi]
- COMPARS: toward an empirical approach for comparing the resilience of reputation systemsEuijin Choo, Jianchun Jiang, Ting Yu. 87-98 [doi]
- RiskMon: continuous and automated risk assessment of mobile applicationsYiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu. 99-110 [doi]
- Situational awareness through reasoning on network incidentsAnna Cinzia Squicciarini, Giuseppe Petracca, William G. Horne, Aurnob Nath. 111-122 [doi]
- Measuring the robustness of source program obfuscation: studying the impact of compiler optimizations on the obfuscation of C programsSandrine Blazy, Stéphanie Riaud. 123-126 [doi]
- Interaction provenance model for unified authentication factors in service oriented computingRagib Hasan, Rasib Khan. 127-130 [doi]
- Detecting man-in-the-middle attacks on non-mobile systemsVisa Antero Vallivaara, Mirko Sailio, Kimmo Halunen. 131-134 [doi]
- A modular multi-location anonymized traffic monitoring tool for a WiFi networkJustin Hummel, Andrew McDonald, Vatsal Shah, Riju Singh, Bradford D. Boyle, Tingshan Huang, Nagarajan Kandasamy, Harish Sethu, Steven Weber. 135-138 [doi]
- Consistency checking in access controlAnja Remshagen, Li Yang. 139-142 [doi]
- POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructuresSeung-Hyun Seo, Jongho Won, Elisa Bertino. 143-146 [doi]
- Spoilt for choice: graph-based assessment of key management protocols to share encrypted dataHolger Kühner, Hannes Hartenstein. 147-150 [doi]
- Trust ranking of medical websitesHaruna Kibirige, Lila Ghemri. 151-154 [doi]
- A cloud architecture for protecting guest's information from malicious operators with memory managementKoki Murakami, Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai. 155-158 [doi]
- Privacy-preserving publication of provenance workflowsMihai Maruseac, Gabriel Ghinita, Razvan Rughinis. 159-162 [doi]
- Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with realityKevin Allix, Tegawendé F. Bissyandé, Quentin Jérome, Jacques Klein, Radu State, Yves Le Traon. 163-166 [doi]
- Securing OAuth implementations in smart phonesMohamed Shehab, Fadi Mohsen. 167-170 [doi]
- Minimizing lifetime of sensitive data in concurrent programsKalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan. 171-174 [doi]
- Systematic audit of third-party android phonesMichael Mitchell, Guanyu Tian, Zhi Wang. 175-186 [doi]
- PREC: practical root exploit containment for android devicesTsung-Hsuan Ho, Daniel Joseph Dean, Xiaohui Gu, William Enck. 187-198 [doi]
- DIVILAR: diversifying intermediate language for anti-repackaging on android platformWu Zhou, Zhi Wang, Yajin Zhou, Xuxian Jiang. 199-210 [doi]
- On quantitative dynamic data flow trackingEnrico Lovat, Johan Oudinet, Alexander Pretschner. 211-222 [doi]
- Security of graph data: hashing schemes and definitionsMuhammad U. Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor. 223-234 [doi]
- Inference attack against encrypted range queries on outsourced databasesMohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu. 235-246 [doi]
- Shared responsibility is better than no responsibility: federated encryption in the cloudJarret Raim. 247-248 [doi]
- Efficient privacy-aware search over encrypted databasesMehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu. 249-256 [doi]
- DroidBarrier: know what is executing on your androidHussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura. 257-264 [doi]
- RopSteg: program steganography with return oriented programmingKangjie Lu, Siyang Xiong, Debin Gao. 265-272 [doi]
- SobrTrA: a software-based trust anchor for ARM cortex application processorsJulian Horsch, Sascha Wessel, Frederic Stumpf, Claudia Eckert. 273-280 [doi]
- TrustID: trustworthy identities for untrusted mobile devicesJulian Horsch, Konstantin Böttinger, Michael Weiß, Sascha Wessel, Frederic Stumpf. 281-288 [doi]
- Keystroke biometrics: the user perspectiveChee Meng Tey, Payas Gupta, Kartik Muralidharan, Debin Gao. 289-296 [doi]
- Relationship-based information sharing in cloud-based decentralized social networksDavide Alberto Albertini, Barbara Carminati. 297-304 [doi]
- WebWinnow: leveraging exploit kit workflows to detect malicious urlsBirhanu Eshete, V. N. Venkatakrishnan. 305-312 [doi]
- Privacy-preserving audit for broker-based health information exchangeSe Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta. 313-320 [doi]
- An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practicalGabriel Ghinita, Razvan Rughinis. 321-332 [doi]
- Is it really you?: user identification via adaptive behavior fingerprintingPaul Giura, Ilona Murynets, Roger Piqueras Jover, Yevgeniy Vahlis. 333-344 [doi]
- Wiretap-proof: what they hear is not what you speak, and what you speak they do not hearHemant Sengar, Haining Wang, Seyed Amir Iranmanesh. 345-356 [doi]