Abstract is missing.
- Confidentiality Policies for Controlled Query EvaluationJoachim Biskup, Torben Weibert. 1-13 [doi]
- Provably-Secure Schemes for Basic Query Support in Outsourced DatabasesGeorgios Amanatidis, Alexandra Boldyreva, Adam O Neill. 14-30 [doi]
- Authenticated Relational Tables and Authenticated Skip ListsGiuseppe Di Battista, Bernardo Palazzi. 31-46 [doi]
- Location Privacy Protection Through Obfuscation-Based TechniquesClaudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. 47-60 [doi]
- Efficient Security Policy Enforcement in a Location Based Service EnvironmentVijayalakshmi Atluri, Heechang Shin. 61-76 [doi]
- Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing EnvironmentsSudip Chakraborty, Nayot Poolsappasit, Indrajit Ray. 77-92 [doi]
- Privacy-Preserving Schema Matching Using Mutual InformationIsabel F. Cruz, Roberto Tamassia, Danfeng Yao. 93-94 [doi]
- The Interval Revocation Scheme for Broadcasting Messages to Stateless ReceiversAnna Zych, Milan Petkovic, Willem Jonker. 95-97 [doi]
- Measuring the Overall Security of Network Configurations Using Attack GraphsLingyu Wang, Anoop Singhal, Sushil Jajodia. 98-112 [doi]
- Enforcing Honesty in Assured Information Sharing Within a Distributed SystemRyan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham. 113-128 [doi]
- A Privacy-Enhanced Attribute-Based Access Control SystemJan Kolter, Rolf Schillinger, Günther Pernul. 129-143 [doi]
- A Scalable and Secure Cryptographic ServiceShouhuai Xu, Ravi S. Sandhu. 144-160 [doi]
- gVault: A Gmail Based Cryptographic Network File SystemRavi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian. 161-176 [doi]
- Design and Analysis of Querying Encrypted Data in Relational DatabasesMustafa Canim, Murat Kantarcioglu. 177-194 [doi]
- Dynamic Event-Based Access Control as Term RewritingClara Bertolissi, Maribel Fernández, Steve Barker. 195-210 [doi]
- A Spatio-temporal Role-Based Access Control ModelIndrakshi Ray, Manachai Toahchoodee. 211-226 [doi]
- Towards a Times-Based Usage Control ModelBaoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin. 227-242 [doi]
- New Paradigm of Inference Control with Trusted ComputingYanjiang Yang, Yingjiu Li, Robert H. Deng. 243-258 [doi]
- Security Patterns for Physical Access Control SystemsEduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie. 259-274 [doi]
- XACML Policies for Exclusive Resource UsageVijayant Dhankhar, Saket Kaushik, Duminda Wijesekera. 275-290 [doi]