Abstract is missing.
- Addressing Privacy and Trust Issues in Cultural Heritage ModellingMichalis Pavlidis, Haralambos Mouratidis, Cesar Gonzalez-Perez, Christos Kalloniatis. 3-16 [doi]
- An Ontology Regulating Privacy Oriented Access ControlsMaherzia Belaazi, Hanen Boussi Rahmouni, Adel Bouhoula. 17-35 [doi]
- A Literature Survey and Classifications on Data DeanonymisationDalal Al-Azizy, David E. Millard, Iraklis Symeonidis, Kieron O'Hara, Nigel Shadbolt. 36-51 [doi]
- Improving Users' Trust Through Friendly Privacy Policies: An Empirical StudyOluwa Lawani, Esma Aïmeur, Kimiz Dalkir. 55-70 [doi]
- MPLS Policy Target Recognition NetworkAbdulrahman Al-Mutairi, Stephen D. Wolthusen. 71-87 [doi]
- Context Aware Intrusion Response Based on Argumentation LogicTarek Bouyahia, Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens. 91-106 [doi]
- Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident ManagementElena Doynikova, Igor V. Kotenko. 107-124 [doi]
- Quantitative Risk, Statistical Methods and the Four Quadrants for Information SecurityGaute Wangen, Andrii Shalaginov. 127-143 [doi]
- Exploring a Controls-Based Assessment of Infrastructure VulnerabilityOliver J. Farnan, Jason R. C. Nurse. 144-159 [doi]
- Quantifying Security in Web ETL ProcessesSalma Dammak, Faiza Ghozzi Jedidi, Faïez Gargouri. 160-173 [doi]
- A Meta-model for Assisting a Cloud Forensics ProcessStavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis. 177-187 [doi]
- POR-2P: Network Coding-Based POR for Data Provision-Payment SystemKazumasa Omote, Tran Phuong Thao. 188-206 [doi]
- A Single Key Scheduling Based Compression FunctionJiageng Chen, Rashed Mazumder, Atsuko Miyaji. 207-222 [doi]
- Security Issue of WirelessHART Based SCADA SystemsLyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens. 225-241 [doi]
- Attack Volume Model: Geometrical Approach and ApplicationGustavo Gonzalez Granadillo, Grégoire Jacob, Hervé Debar. 242-257 [doi]
- An Intensive Analysis of Security and Privacy Browser Add-OnsNikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis. 258-273 [doi]
- MBotCS: A Mobile Botnet Detection System Based on Machine LearningXin Meng, George Spanoudakis. 274-291 [doi]
- Toward Securing MANET Against the Energy Depletion AttackAida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi. 292-306 [doi]