Abstract is missing.
- Protecting Privacy in Data ReleaseSabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati. 1-34 [doi]
- An Introduction to Security API AnalysisRiccardo Focardi, Flaminia L. Luccio, Graham Steel. 35-65 [doi]
- Cryptographic Verification by Typing for a Sample Protocol ImplementationCédric Fournet, Karthikeyan Bhargavan, Andrew D. Gordon. 66-100 [doi]
- Model-Driven Development of Security-Aware GUIs for Data-Centric ApplicationsDavid A. Basin, Manuel Clavel, Marina Egea, Miguel Angel García de Dios, Carolina Dania, Gonzalo Ortiz, Javier Valdazo. 101-124 [doi]
- On Intransitive Non-interference in Some Models of ConcurrencyRoberto Gorrieri, Matteo Vernali. 125-151 [doi]
- A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process ApproachYudistira Asnar, Fabio Massacci. 152-184 [doi]
- The Geometry of Lattice CryptographyDaniele Micciancio. 185-210 [doi]
- Quantitative Information Flow and Applications to Differential PrivacyMário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Catuscia Palamidessi. 211-230 [doi]
- Risk Analysis of Changing and Evolving Systems Using CORASMass Soldal Lund, Bjørnar Solhaug, Ketil Stølen. 231-274 [doi]