Abstract is missing.
- Information Flow Containment: A Practical Basis for Malware DefenseR. Sekar. 1-3 [doi]
- Re-designing the Web s Access Control System - (Extended Abstract)Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu. 4-11 [doi]
- Integrated Management of Security PoliciesStefano Paraboschi. 12-13 [doi]
- Cooperative Data Access in Multi-cloud EnvironmentsMeixing Le, Krishna Kant, Sushil Jajodia. 14-28 [doi]
- Multiparty Authorization Framework for Data Sharing in Online Social NetworksHongxin Hu, Gail-Joon Ahn. 29-43 [doi]
- Enforcing Confidentiality and Data Visibility Constraints: An OBDD ApproachValentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati. 44-59 [doi]
- Public-Key Encrypted Bloom Filters with Applications to Supply Chain IntegrityFlorian Kerschbaum. 60-75 [doi]
- An Optimization Model for the Extended Role Mining ProblemEmre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya. 76-89 [doi]
- Dynamics in Delegation and Revocation Schemes: A Logical ApproachGuillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert van der Torre. 90-105 [doi]
- History-Dependent Inference Control of Queries by Dynamic Policy AdaptionJoachim Biskup. 106-121 [doi]
- Multilevel Secure Data Stream ProcessingRaman Adaikkalavan, Indrakshi Ray, Xing Xie. 122-137 [doi]
- Query Processing in Private Data Outsourcing Using AnonymizationAhmet Erhan Nergiz, Chris Clifton. 138-153 [doi]
- Private Database Search with Sublinear Query TimeKeith B. Frikken, Boyang Li. 154-169 [doi]
- Efficient Distributed Linear Programming with Limited DisclosureYuan Hong, Jaideep Vaidya, Haibing Lu. 170-185 [doi]
- Privacy-Preserving Data Mining: A Game-Theoretic ApproachAtsuko Miyaji, Mohammad Shahriar Rahman. 186-200 [doi]
- Enhancing CardSpace Authentication Using a Mobile DeviceHaitham S. Al-Sinani, Chris J. Mitchell. 201-216 [doi]
- Verifiable Secret Sharing with Comprehensive and Efficient Public VerificationKun Peng. 217-230 [doi]
- A Robust Remote User Authentication Scheme against Smart Card Security BreachChun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee. 231-238 [doi]
- N-Gram Based Secure Similar Document DetectionWei Jiang, Bharath K. Samanthula. 239-246 [doi]
- An Index Structure for Private Data OutsourcingAaron Steele, Keith B. Frikken. 247-254 [doi]
- Selective Disclosure on Encrypted DocumentsHao Lei, Dengguo Feng. 255-262 [doi]
- A New Leakage-Resilient IBE Scheme in the Relative Leakage ModelYu Chen, Song Luo, Zhong Chen. 263-270 [doi]
- Accurate Accident Reconstruction in VANETYuliya Kopylova, Csilla Farkas, Wenyuan Xu. 271-279 [doi]
- Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based LearningVarun Dutt, Young-Suk Ahn, Cleotilde Gonzalez. 280-292 [doi]
- Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBACSolomon Berhe, Steven A. Demurjian, Swapna S. Gokhale, Jaime A. Pavlich-Mariscal, Rishi Saripalle. 293-300 [doi]
- Preserving Privacy in Structural NeuroimagesNakeisha Schimke, Mary Kuehler, John Hale. 301-308 [doi]