Abstract is missing.
- Controlled Query Evaluation and Inference-Free View UpdatesJoachim Biskup, Jens Seiler, Torben Weibert. 1-16 [doi]
- Implementing Reflective Access Control in SQLLars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett. 17-32 [doi]
- An Approach to Security Policy Configuration Using Semantic Threat GraphsSimon N. Foley, William M. Fitzgerald. 33-48 [doi]
- Reaction Policy Model Based on Dynamic Organizations and Threat ContextFabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens. 49-64 [doi]
- Towards System Integrity Protection with Graph-Based Policy AnalysisWenjuan Xu, Xinwen Zhang, Gail-Joon Ahn. 65-80 [doi]
- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata EvaluationKeith B. Frikken. 81-94 [doi]
- Privacy-Preserving Telemonitoring for eHealthMohamed Layouni, Kristof Verslype, Mehmet Tahir Sandikkaya, Bart De Decker, Hans Vangheluwe. 95-110 [doi]
- Analysis of Data Dependency Based Intrusion Detection SystemYermek Nugmanov, Brajendra Panda, Yi Hu. 111-125 [doi]
- Secure Method Calls by Instrumenting Bytecode with AspectsXiaofeng Yang, Mohammad Zulkernine. 126-141 [doi]
- Distributed Privilege Enforcement in PACSChristoph Sturm, Ela Hunt, Marc H. Scholl. 142-158 [doi]
- Spatiotemporal Access Control Enforcement under Uncertain Location EstimatesHeechang Shin, Vijayalakshmi Atluri. 159-174 [doi]
- Using Edit Automata for Rewriting-Based Security EnforcementHakima Ould-Slimane, Mohamed Mejri, Kamel Adi. 175-190 [doi]
- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data ProvidersPawel Jurczyk, Li Xiong. 191-207 [doi]
- Detecting Inference Channels in Private Multimedia Data via Social NetworksBechara al Bouna, Richard Chbeir. 208-224 [doi]
- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted ClientsValentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 225-239 [doi]
- Data Is Key: Introducing the Data-Based Access Control ParadigmWolter Pieters, Qiang Tang. 240-251 [doi]
- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing TechnologyStephen R. Tate, Roopa Vishwanathan. 252-267 [doi]
- PAES: Policy-Based Authority Evaluation SchemeEnrico Scalavino, Vaibhav Gowadia, Emil C. Lupu. 268-282 [doi]
- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBACSolomon Berhe, Steven A. Demurjian, Thomas Agresta. 283-290 [doi]
- Methods for Computing Trust and Reputation While Preserving PrivacyEhud Gudes, Nurit Gal-Oz, Alon Grubshtein. 291-298 [doi]
- Building an Application Data Behavior Model for Intrusion DetectionOlivier Sarrouy, Eric Totel, Bernard Jouga. 299-306 [doi]
- A Trust-Based Access Control Model for Pervasive Computing ApplicationsManachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray. 307-314 [doi]