Abstract is missing.
- Cryptographically Enforced Role-Based Access Control for NoSQL Distributed DatabasesYossif Shalabi, Ehud Gudes. 3-19 [doi]
- Resilient Reference Monitor for Distributed Access Control via Moving Target DefenseDieudonne Mulamba, Indrajit Ray. 20-40 [doi]
- Preventing Unauthorized Data FlowsEmre Uzun, Gennaro Parlato, Vijayalakshmi Atluri, Anna Lisa Ferrara, Jaideep Vaidya, Shamik Sural, David Lorenzi. 41-62 [doi]
- Object-Tagged RBAC Model for the Hadoop EcosystemMaanak Gupta, Farhan Patwa, Ravi S. Sandhu. 63-81 [doi]
- Identification of Access Control Policy Sentences from Natural Language Policy DocumentsMasoud Narouei, Hamed Khanpour, Hassan Takabi. 82-100 [doi]
- Fast Distributed Evaluation of Stateful Attribute-Based Access Control PoliciesThang Bui, Scott D. Stoller, Shikhar Sharma. 101-119 [doi]
- Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential PrivacyXiaosu Tong, Bowei Xi, Murat Kantarcioglu, Ali Inan. 123-141 [doi]
- Differentially Private K-Skyband Query Answering Through Adaptive Spatial DecompositionLing Chen, Ting Yu, Rada Chirkova. 142-163 [doi]
- Mutually Private Location Proximity Detection with Access ControlMichael G. Solomon, Vaidy S. Sunderam, Xiong Li, Ming Li. 164-184 [doi]
- Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker DiscoveryJun Zhang, Meiqi He, Siu-Ming Yiu. 185-204 [doi]
- Privacy-Preserving Community-Aware Trending Topic Detection in Online Social MediaTheodore Georgiou, Amr El Abbadi, Xifeng Yan. 205-224 [doi]
- Privacy-Preserving Outlier Detection for Data StreamsJonas Böhler, Daniel Bernau, Florian Kerschbaum. 225-238 [doi]
- Undoing of Privacy Policies on FacebookVishwas T. Patil, R. K. Shyamasundar. 239-255 [doi]
- Towards Actionable Mission Impact Assessment in the Context of Cloud ComputingXiaoyan Sun, Anoop Singhal, Peng Liu. 259-274 [doi]
- Reducing Security Risks of Clouds Through Virtual Machine PlacementJin Han, Wanyu Zang, Songqing Chen, Meng Yu. 275-292 [doi]
- Firewall Policies Provisioning Through SDN in the CloudNora Cuppens, Salaheddine Zerkane, Yanhuang Li, David Espes, Philippe Le Parc, Frédéric Cuppens. 293-310 [doi]
- Budget-Constrained Result Integrity Verification of Outsourced Data Mining ComputationsBo Zhang, Boxiang Dong, Wendy Hui Wang. 311-324 [doi]
- Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted DatabasesFlorian Kerschbaum, Martin Härterich. 325-336 [doi]
- Efficient Protocols for Private Database QueriesTushar Kanti Saha, Mayank, Takeshi Koshiba. 337-348 [doi]
- Toward Group-Based User-Attribute Policies in Azure-Like Access Control SystemsAnna Lisa Ferrara, Anna Cinzia Squicciarini, Cong Liao, Truc L. Nguyen. 349-361 [doi]
- High-Speed High-Security Public Key Encryption with Keyword SearchRouzbeh Behnia, Attila Altay Yavuz, Muslum Ozgur Ozmen. 365-385 [doi]
- HardIDX: Practical and Secure Index with SGXBenny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn 0001, Florian Kerschbaum, Ahmad-Reza Sadeghi. 386-408 [doi]
- A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure ConstructionSebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade. 409-429 [doi]
- Keylogger Detection Using a Decoy KeyboardSeth Simms, Margot Maxwell, Sara Johnson, Julian L. Rrushi. 433-452 [doi]
- The Fallout of Key Compromise in a Proxy-Mediated Key Agreement ProtocolDavid Nuñez, Isaac Agudo, Javier Lopez. 453-472 [doi]
- Improving Resilience of Behaviometric Based Continuous Authentication with Multiple AccelerometersTim Van hamme, Davy Preuveneers, Wouter Joosen. 473-485 [doi]
- A Content-Aware Trust Index for Online Review Spam DetectionHao Xue, FengJun Li. 489-508 [doi]
- Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening OptionsDaniel Borbor, Lingyu Wang 0001, Sushil Jajodia, Anoop Singhal. 509-528 [doi]
- A Distributed Mechanism to Protect Against DDoS AttacksNegar Mosharraf, Anura P. Jayasumana, Indrakshi Ray. 529-540 [doi]
- Securing Web Applications with Predicate Access ControlZhaomo Yang, Kirill Levchenko. 541-554 [doi]