Abstract is missing.
- Understanding and Protecting Privacy: Formal Semantics and Principled Audit MechanismsAnupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Arunesh Sinha. 1-27 [doi]
- Efficient Secure Computation with Garbled CircuitsYan Huang, Chih-Hao Shen, David Evans, Jonathan Katz, Abhi Shelat. 28-48 [doi]
- Defending Users against Smartphone Apps: Techniques and Future DirectionsWilliam Enck. 49-70 [doi]
- Secure Composition of Cryptographic ProtocolsVipul Goyal. 71 [doi]
- Flow Based Interpretation of Access Control: Detection of Illegal Information FlowsMathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé. 72-86 [doi]
- Consistency Policies for Dynamic Information Systems with Declassification FlowsJulien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia. 87-101 [doi]
- Authorization Policy Specification and Enforcement for Group-Centric Secure Information SharingRam Krishnan, Ravi S. Sandhu. 102-115 [doi]
- Abductive Analysis of Administrative Policies in Rule-Based Access ControlPuneet Gupta, Scott D. Stoller, Zhongyuan Xu. 116-130 [doi]
- Towards Detection of Botnet Communication through Social Media by Monitoring User ActivityPieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips. 131-143 [doi]
- Finding Non-trivial Malware Naming InconsistenciesFederico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero. 144-159 [doi]
- Taint-Enhanced Anomaly DetectionLorenzo Cavallaro, R. Sekar. 160-174 [doi]
- Secured Cloud Storage Scheme Using ECC Based Key Management in User HierarchyAtanu Basu, Indranil Sengupta, Jamuna Kanta Sing. 175-189 [doi]
- Reversible Image Watermarking through Coordinate Logic Operation Based PredictionRuchira Naskar, Rajat Subhra Chakraborty. 190-203 [doi]
- Some Combinatorial Results towards State Recovery Attack on RC4Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar. 204-214 [doi]
- Distributed Signcryption from PairingsIndivar Gupta, P. K. Saxena. 215-234 [doi]
- Formal Privacy Analysis of Communication Protocols for Identity ManagementMeilof Veeningen, Benne de Weger, Nicola Zannone. 235-249 [doi]
- Load Time Security VerificationOlga Gadyatskaya, Eduardo Lostal, Fabio Massacci. 250-264 [doi]
- Preserving Location Privacy for Continuous Queries on Known RouteAnuj S. Saxena, Mayank Pundir, Vikram Goyal, Debajyoti Bera. 265-279 [doi]
- A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing AttacksFaraz Ahmed, M. Zubair Rafique, Muhammad Abulaish. 280-293 [doi]
- An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor NetworksPrithu Banerjee, Mahasweta Mitra, Ferdous A. Barbhuiya, Sandip Chakraborty, Sukumar Nandi. 294-308 [doi]
- SecWEM: A Security Solution for Web Based E-mailRavi Shankar Yadav, Praveen Likhar, M. Keshava Rao. 309-321 [doi]
- A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoSDimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis. 322-336 [doi]
- Mitigation of Malicious Modifications by Insiders in DatabasesHarini Ragavan, Brajendra Panda. 337-351 [doi]
- A Semantic Hierarchy for Erasure PoliciesFilippo Del Tedesco, Sebastian Hunt, David Sands. 352-369 [doi]
- A Universal Semantic Bridge for Virtual Machine IntrospectionChristian Schneider, Jonas Pfoh, Claudia Eckert. 370-373 [doi]
- A Signature-Based Approach of Correctness Assurance in Data Outsourcing ScenariosMorteza Noferesti, Mohammad Ali Hadavi, Rasool Jalili. 374-378 [doi]
- Towards Access Control Model EngineeringWinfried E. Kühnhauser, Anja Pölck. 379-382 [doi]
- IFrandbox - Client Side Protection from Malicious Injected IframesTanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais. 383-386 [doi]