Abstract is missing.
- Deciphering Text from Touchscreen Key TapsHaritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. 3-18 [doi]
- The Fréchet/Manhattan Distance and the Trajectory Anonymisation ProblemChristof Ferreira Torres, Rolando Trujillo-Rasua. 19-34 [doi]
- Guaranteeing Correctness of Bulk Operations in Outsourced DatabasesLuca Ferretti, Michele Colajanni, Mirco Marchetti. 37-51 [doi]
- Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe ProtocolsGiovanni Di Crescenzo, Euthimios Panagos, Brian A. Coan. 52-60 [doi]
- Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive HashesIbrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn. 61-76 [doi]
- Mining Hierarchical Temporal Roles with Multiple MetricsScott D. Stoller, Thang Bui. 79-95 [doi]
- Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model InstancesJason Crampton, James Sellwood. 96-105 [doi]
- Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaSNavid Pustchi, Ravi Sandhu. 106-121 [doi]
- A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC ModelsProsunjit Biswas, Ravi Sandhu, Ram Krishnan. 122-129 [doi]
- Access Control for the Shuffle IndexSabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati. 130-147 [doi]
- Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract)Shlomi Dolev, Yin Li, Shantanu Sharma 0001. 151-160 [doi]
- Towards Creating Believable Decoy Project Folders for Detecting Data TheftStefan Thaler, Jerry den Hartog, Milan Petkovic. 161-169 [doi]
- Practical Differentially Private Modeling of Human Movement DataHarichandan Roy, Murat Kantarcioglu, Latanya Sweeney. 170-178 [doi]
- A Practical Framework for Executing Complex Queries over Encrypted Multimedia DataFahad Shaon, Murat Kantarcioglu. 179-195 [doi]
- Data Governance and Transparency for Collaborative SystemsRauf Mahmudlu, Jerry den Hartog, Nicola Zannone. 199-216 [doi]
- Sharing-Habits Based Privacy Control in Social NetworksSilvie Levy, Ehud Gudes, Nurit Gal-Oz. 217-232 [doi]
- Counteracting Active Attacks in Social Network GraphsSjouke Mauw, Rolando Trujillo-Rasua, Bochuan Xuan. 233-248 [doi]
- Formalizing Threat Models for Virtualized SystemsDaniele Sgandurra, Erisa Karafili, Emil Lupu. 251-267 [doi]
- Reasoning About Firewall Policies Through Refinement and CompositionUltan Neville, Simon N. Foley. 268-284 [doi]
- CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the CloudErman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy, Bradley Malin. 285-294 [doi]
- Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown AttacksDaniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal. 295-312 [doi]
- Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric SystemsJulien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer. 313-327 [doi]
- Whom You Gonna Trust? A Longitudinal Study on TLS Notary ServicesGeorg Merzdovnik, Klaus Falb, Martin Schmiedecker, Artemios G. Voyiatzis, Edgar R. Weippl. 331-346 [doi]
- Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software SystemsOlgierd Pieczul, Simon N. Foley. 347-363 [doi]