Abstract is missing.
- Logics for Security and PrivacyLeendert van der Torre. 1-7 [doi]
- A User-to-User Relationship-Based Access Control Model for Online Social NetworksYuan Cheng, Jaehong Park, Ravi S. Sandhu. 8-24 [doi]
- Automated and Efficient Analysis of Role-Based Access Control with AttributesAlessandro Armando, Silvio Ranise. 25-40 [doi]
- A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBACXin Jin, Ram Krishnan, Ravi S. Sandhu. 41-55 [doi]
- Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join DependenciesJoachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann. 56-73 [doi]
- Privacy Consensus in Anonymization Systems via Game TheoryRosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini. 74-89 [doi]
- Uniform Obfuscation for Location PrivacyGianluca Dini, Pericle Perazzo. 90-105 [doi]
- Security Vulnerabilities of User Authentication Scheme Using Smart CardRavi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi. 106-113 [doi]
- Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart CardsDing Wang, Chunguang Ma, Peng Wu. 114-121 [doi]
- A Friendly Framework for Hidding fault enabled virus for Java Based SmartcardTiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet. 122-128 [doi]
- Approximate Privacy-Preserving Data Mining on Vertically Partitioned DataRobert Nix, Murat Kantarcioglu, Keesook J. Han. 129-144 [doi]
- Security Limitations of Using Secret Sharing for Data OutsourcingJonathan L. Dautrich Jr., Chinya V. Ravishankar. 145-160 [doi]
- Privacy-Preserving Subgraph DiscoveryDanish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri. 161-176 [doi]
- Decentralized Semantic Threat GraphsSimon N. Foley, William M. Fitzgerald. 177-192 [doi]
- Code Type Revealing Using Experiments FrameworkRami Sharon, Ehud Gudes. 193-206 [doi]
- From MDM to DB2: A Case Study of Security Enforcement MigrationNikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run. 207-222 [doi]
- XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting AttacksSmitha Sundareswaran, Anna Cinzia Squicciarini. 223-238 [doi]
- Randomizing Smartphone Malware Profiles against Statistical Mining TechniquesAbhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani M. Thuraisingham. 239-254 [doi]
- Layered Security Architecture for Masquerade Attack DetectionHamed Saljooghinejad, Wilson Naik Bhukya. 255-262 [doi]
- k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data OutsourcingAbbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili. 263-273 [doi]
- Reconstruction Attack through Classifier AnalysisSébastien Gambs, Ahmed Gmati, Michel Hurfin. 274-281 [doi]
- Distributed Data Federation without Disclosure of User ExistenceTakao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga. 282-297 [doi]
- Improving Virtualization Security by Splitting Hypervisor into Smaller ComponentsWuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing. 298-313 [doi]
- Enforcing Subscription-Based Authorization Policies in Cloud ScenariosSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga. 314-329 [doi]