Abstract is missing.
- Data Protection in Cloud ScenariosSabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. 3-10 [doi]
- Composable Bounds on Information Flow from Distribution DifferencesMegumi Ando, Joshua D. Guttman. 13-29 [doi]
- Quantitative Analysis of Network Security with Abstract ArgumentationFrancesco Santini, Artsiom Yautsiukhin. 30-46 [doi]
- Security-Based Adaptation of Multi-cloud ApplicationsKyriakos Kritikos, Philippe Massonet. 47-64 [doi]
- AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web ServicesChristian Altmeier, Christian Mainka, Juraj Somorovsky, Jörg Schwenk. 65-80 [doi]
- An Integrated Reward and Reputation Mechanism for MCS Preserving Users' PrivacyCristian Tanas, Sergi Delgado-Segura, Jordi Herrera-Joancomartí. 83-99 [doi]
- Stronger Security for Sanitizable SignaturesStephan Krenn, Kai Samelin, Dieter Sommer. 100-117 [doi]
- Some Remarks and Ideas About Monetization of Sensitive DataAnia M. Piotrowska, Marek Klonowski. 118-133 [doi]
- A Novel Approach to Data Revocation on the InternetOlga Kieselmann, Nils Kopal, Arno Wacker. 134-149 [doi]
- PerfectDedup: Secure Data DeduplicationPasquale Puzio, Refik Molva, Melek Önen, Sergio Loureiro. 150-166 [doi]
- Privacy-Preserving Biometric Authentication and Matching via Lattice-Based EncryptionConstantinos Patsakis, Jeroen van Rest, Michal Choras, Mélanie Bouroche. 169-182 [doi]
- Comprehensive and Improved Secure Biometric System Using Homomorphic EncryptionAvradip Mandal, Arnab Roy, Masaya Yasuda. 183-198 [doi]
- On the Privacy of Horizontally Partitioned Binary Data-Based Privacy-Preserving Collaborative FilteringMurat Okkalioglu, Mehmet Koç, Huseyin Polat. 199-214 [doi]
- Privacy Threats in E-Shopping (Position Paper)Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodriguez, Moti Yung. 217-225 [doi]
- Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper)Jan Henrik Ziegeldorf, Martin Henze, René Hummen, Klaus Wehrle. 226-234 [doi]
- Can you Really Anonymize the Donors of Genomic Data in Today's Digital World?Mohammed Alser, Nour Almadhoun, Azita Nouri, Can Alkan, Erman Ayday. 237-244 [doi]
- User-Centric Privacy-Preserving Collection and Analysis of Trajectory DataCristina Romero-Tris, David Megías. 245-253 [doi]
- The Leaking Battery - A Privacy Analysis of the HTML5 Battery Status APILukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz. 254-263 [doi]
- Secure Refactoring with Java Information FlowSteffen Helke, Florian Kammüller, Christian W. Probst. 264-272 [doi]
- You Never Surf Alone. Ubiquitous Tracking of Users' Browsing HabitsSilvia Puglisi, David Rebollo-Monedero, Jordi Forné. 273-280 [doi]
- LockPic: Privacy Preserving Photo Sharing in Social NetworksCarlos Pares-Pulido, Isaac Agudo. 281-290 [doi]