Abstract is missing.
- Extending Loose Associations to Multiple FragmentsSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati. 1-16 [doi]
- Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret?Joachim Biskup, Marcel Preuß. 17-32 [doi]
- Differentially Private Multi-dimensional Time Series Release for Traffic MonitoringLiyue Fan, Li Xiong, Vaidy S. Sunderam. 33-48 [doi]
- Policy Analysis for Administrative Role Based Access Control without Separate AdministrationPing Yang, Mikhail I. Gofman, Zijiang Yang. 49-64 [doi]
- Toward Mining of Temporal RolesBarsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. 65-80 [doi]
- Towards User-Oriented RBAC ModelHaibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar. 81-96 [doi]
- Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud InvestigationsSean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France. 97-112 [doi]
- TerraCheck: Verification of Dedicated Cloud StorageZhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing. 113-127 [doi]
- Fair Private Set Intersection with a Semi-trusted ArbiterChangyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello. 128-144 [doi]
- Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an IntersectionHiroaki Kikuchi, Jun Sakuma. 145-163 [doi]
- Using Safety Constraint for Transactional Dataset AnonymizationBechara al Bouna, Chris Clifton, Qutaibah M. Malluhi. 164-178 [doi]
- Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced DatabasesAttila Altay Yavuz. 179-194 [doi]
- Optimal Re-encryption Strategy for Joins in Encrypted DatabasesFlorian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert. 195-210 [doi]
- Access Control and Query Verification for Untrusted DatabasesRohit Jain, Sunil Prabhakar. 211-225 [doi]
- Quantitative Security Risk Assessment of Android Permissions and ApplicationsYang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala. 226-241 [doi]
- A Model for Trust-Based Access Control and Delegation in Mobile CloudsIndrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han. 242-257 [doi]
- Result Integrity Verification of Outsourced Frequent Itemset MiningBoxiang Dong, Ruilin Liu, Wendy Hui Wang. 258-265 [doi]
- An Approach to Select Cost-Effective Risk CountermeasuresLe Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen. 266-273 [doi]
- Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the SetbaseBenjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere. 274-281 [doi]
- Rule Enforcement with Third Parties in Secure Cooperative Data AccessMeixing Le, Krishna Kant, Sushil Jajodia. 282-288 [doi]
- Unlinkable Content Playbacks in a Multiparty DRM SystemRonald Petrlic, Stephan Sekula. 289-296 [doi]
- Analysis of TRBAC with Dynamic Temporal Role HierarchiesEmre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural. 297-304 [doi]