Abstract is missing.
- Evoking Comprehensive Mental Models of Anonymous CredentialsErik Wästlund, Julio Angulo, Simone Fischer-Hübner. 1-14 [doi]
- Towards Usable Interfaces for Proof Based Access Rights on Mobile DevicesMarcel Heupel, Dogan Kesdogan. 15-27 [doi]
- Commercial Home Assistance (eHealth) ServicesMilica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker. 28-42 [doi]
- Detecting Computer Worms in the CloudSebastian Biedermann, Stefan Katzenbeisser. 43-54 [doi]
- Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and ChallengesEndre Bangerter, Stefan Bühlmann, Engin Kirda. 55-64 [doi]
- Challenges for Dynamic Analysis of iOS ApplicationsMartin Szydlowski, Manuel Egele, Christopher Kruegel, Giovanni Vigna. 65-77 [doi]
- Energy-Efficient Cryptographic Engineering ParadigmMarine Minier, Raphael C.-W. Phan. 78-88 [doi]
- Towards a Similarity Metric for Comparing Machine-Readable Privacy PoliciesInger Anne Tøndel, Åsmund Ahlmann Nyre. 89-103 [doi]
- Abstract Privacy Policy Framework: Addressing Privacy Problems in SOALaurent Bussard, Ulrich Pinsdorf. 104-118 [doi]
- Flexible and Dynamic Consent-CapturingMuhammad Rizwan Asghar, Giovanni Russello. 119-131 [doi]
- Towards User Centric Data Governance and Control in the CloudStephan Groß, Alexander Schill. 132-144 [doi]
- Securing Data Provenance in the CloudMuhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo. 145-160 [doi]