Abstract is missing.
- Modeling and Mitigating the Insider Threat of Remote Administrators in CloudsNawaf Alhebaishi, Lingyu Wang 0001, Sushil Jajodia, Anoop Singhal. 3-20 [doi]
- Blockchain-Based Auditing of Transparent Log ServersHoang Long Nguyen, Jean-Philippe Eisenbarth, Claudia-Lavinia Ignat, Olivier Perrin 0001. 21-37 [doi]
- Probabilistic Event Graph to Model Safety and Security for Diagnosis PurposesEdwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon N. Foley, Youssef Laarouchi. 38-47 [doi]
- Enabling the Deployment of ABAC Policies in RBAC SystemsGunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural. 51-68 [doi]
- Policy Languages and Their Suitability for Trust NegotiationMartin Kolár, M. Carmen Fernández Gago, Javier López. 69-84 [doi]
- Role of Apps in Undoing of Privacy Policies on FacebookVishwas T. Patil, Nivia Jatain, R. K. Shyamasundar. 85-98 [doi]
- Towards Adaptive Access ControlLuciano Argento, Andrea Margheri, Federica Paci, Vladimiro Sassone, Nicola Zannone. 99-109 [doi]
- Oblivious Dynamic Searchable Encryption on Distributed Cloud SystemsThang Hoang, Attila A. Yavuz, F. Betül Durak, Jorge Guajardo. 113-130 [doi]
- Privacy-Preserving Planarity Testing of Distributed GraphsGuy Barshap, Tamir Tassa. 131-147 [doi]
- Image Pixelization with Differential PrivacyLiyue Fan. 148-162 [doi]
- Data Integrity Verification in Column-Oriented NoSQL DatabasesGrisha Weintraub, Ehud Gudes. 165-181 [doi]
- A Novel Hybrid Password Authentication Scheme Based on Text and ImageIan Mackie, Merve Yildirim. 182-197 [doi]
- "It's Shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour AnalyserMajid Hatamian, Agnieszka Kitkowska, Jana Korunovska, Sabrina Kirrane. 198-215 [doi]
- FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux PoliciesB. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar. 219-231 [doi]
- On Understanding Permission Usage Contextuality in Android AppsMd Zakir Hossen, Mohammad Mannan. 232-242 [doi]
- Private yet Efficient Decision Tree EvaluationMarc Joye, Fariborz Salehi. 243-259 [doi]
- Breaking and Fixing the Security Proof of Garbled Bloom FiltersCédric Van Rompay, Melek Önen. 263-277 [doi]
- USBlock: Blocking USB-Based Keypress Injection AttacksSebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar R. Weippl. 278-295 [doi]
- Virtually Isolated Network: A Hybrid Network to Achieve High Level SecurityJia Xu, Jianying Zhou 0001. 299-311 [doi]
- Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised MethodologyAmine Boukhtouta, Makan Pourzandi, Richard Brunner, Stéphane Dault. 312-329 [doi]
- Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency GraphsChen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu. 330-348 [doi]