Abstract is missing.
- Cryptography and Information Security in the Post-Snowden EraBart Preneel. 1 [doi]
- PPL v2.0: Uniform Data Access and Usage Control on Cloud and MobileFrancesco Di Cerbo, Doliere Francis Some, Laurent Gomez, Slim Trabelsi. 2-7 [doi]
- Assessment of Access Control Systems Using Mutation TestingSaid Daoudagh, Francesca Lonetti, Eda Marchetti. 8-13 [doi]
- Identifying Transitivity Threats in Social NetworksSorren Hanvey, Néstor Cataño. 14-19 [doi]
- A Guide to End-to-End Privacy AccountabilityDenis Butin, Daniel Le Métayer. 20-25 [doi]
- Impact of Legal Interpretation in Business Process ComplianceSepideh Ghanavati, Joris Hulstijn. 26-31 [doi]
- Introducing New Technology into Italian Certified Electronic Mail: A ProposalMarina Buzzi, Luca Ferrucci, Francesco Gennai, Claudio Petrucci. 32-37 [doi]
- Personal Cloudlets: Implementing a User-centric Datastore with Privacy Aware Access Control for Cloud-Based Data PlatformsDónal McCarthy, Paul Malone, Johannes Hange, Kenny Doyle, Eric Robson, Dylan Conway, Stepan Ivanov, Lukasz Radziwonowicz, Robert Kleinfeld, Theodoros Michalareas, Timotheos Kastrinogiannis, Nikos Stasinos, Fenareti Lampathaki. 38-43 [doi]
- Common Length Name Representation: An Efficient Privacy-Preserving SchemeHanna Farah, Daniel Amyot, Khaled El Emam. 44-49 [doi]
- Privacy Points as a Method to Support Privacy Impact AssessmentsJulia Himmel, Nikolas Siebler, Felix Laegeler, Marco Grupe, Hanno Langweg. 50-53 [doi]
- A Cloud-Based Radiological Portal for the Patients: IT Contributing to Position the Patient as the Central Axis of the 21st Century Healthcare CyclesRoberto Sanz-Requena, Alejandro Mañas Garcia, José Luis Cabrera-Ayala, Gracián García-Martí. 54-57 [doi]
- Sharing Data through Confidential Clouds: An Architectural PerspectiveDaniele Sgandurra, Francesco Di Cerbo, Slim Trabelsi, Fabio Martinelli, Emil C. Lupu. 58-61 [doi]