Abstract is missing.
- Single-party private web searchAlexandre Viejo, Jordi Castellà-Roca, Oriol Bernado, Josep Maria Mateo-Sanz. 1-8 [doi]
- An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-castGianpiero Costantino, Fabio Martinelli, Paolo Santi, Dario Amoruso. 9-16 [doi]
- Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisionsMarian Harbach, Sascha Fahl, Michael Brenner, Thomas Muders, Matthew Smith. 17-24 [doi]
- SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0)Arun Prakash, Kumara Krishnan, Bon K. Sy. 25-34 [doi]
- Exploring re-identification risks in public domainsAditi Ramachandran, Lisa Singh, Edward Porter, Frank Nagle. 35-42 [doi]
- WhACKY! - What anyone could know about you from TwitterDenzil Correa, Ashish Sureka, Raghav Sethi. 43-50 [doi]
- Privacy-preserving resource evaluation in social networksFrancesco Buccafurri, Lidia Fotia, Gianluca Lax. 51-58 [doi]
- Limiting data collection in application forms: A real-case application of a founding privacy principleNicolas Anciaux, Benjamin Nguyen, Michalis Vazirgiannis. 59-66 [doi]
- Aggregation and privacy in multi-relational databasesYasser Jafer, Herna L. Viktor, Eric Paquet. 67-74 [doi]
- Sticky policies for data control in the cloudSlim Trabelsi, Jakub Sendor. 75-80 [doi]
- A secure data deduplication framework for cloud environmentsFatema Rashid, Ali Miri, Isaac Woungang. 81-87 [doi]
- Risk perception of internet-related activitiesDaniel Leblanc, Robert Biddle. 88-95 [doi]
- An integrated key management and secure routing framework for Mobile Ad-Hoc NetworksShushan Zhao, Robert D. Kent, Akshai K. Aggarwal. 96-103 [doi]
- PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documentsFlorian Schmitt, Jan Gassen, Elmar Gerhards-Padilla. 104-111 [doi]
- Automated detection of session management vulnerabilities in web applicationsYusuke Takamatsu, Yuji Kosuga, Kenji Kono. 112-119 [doi]
- Towards a BPEL model-driven approach for Web services securityHanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok. 120-127 [doi]
- Out of sight, out of mind: Effects of displaying access-control information near the item it controlsKami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter. 128-136 [doi]
- A provenance-based access control modelJaehong Park, Dang Nguyen, Ravi S. Sandhu. 137-144 [doi]
- Obligations in risk-aware access controlLiang Chen, Jason Crampton, Martin J. Kollingbaum, Timothy J. Norman. 145-152 [doi]
- A concordance framework for building trust evidencesAnirban Basu, Natasha Dwyer, Stephen Naicken. 153-154 [doi]
- Making trusted attribute assertions online with the publish trust frameworkJennifer Golbeck, Hal Warren, Eva Winer. 155-156 [doi]
- Advice and trust in games of choiceCody Buntain, Jennifer Golbeck, Dana S. Nau, Sarit Kraus. 157-158 [doi]
- Towards requirements for trust managementMark Vinkovits. 159-160 [doi]
- Social secret sharing in cloud computing using a new trust functionMehrdad Nojoumian, Douglas R. Stinson. 161-167 [doi]
- Building robust Reputation Systems for travel-related servicesHuiying Duan, Peng Yang. 168-175 [doi]
- Collaborative trust evaluation for wiki securityKasper Lindberg, Christian Damsgaard Jensen. 176-184 [doi]
- The theory of creating trust with a set of mistrust-partiesJohannes Viehmann. 185-194 [doi]
- CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networksAyman Tajeddine, Ayman I. Kayssi, Ali Chehab. 195-202 [doi]
- Service provider authentication assuranceAudun Jøsang, Kent A. Varmedal, Christophe Rosenberger, Rajendra Kumar. 203-210 [doi]
- Ethical and legal considerations of reCAPTCHAJonathan Lung. 211-216 [doi]
- Platform for privacy preferences (P3P): Current status and future directionsMuyiwa Olurin, Carlisle Adams, Luigi Logrippo. 217-220 [doi]
- Privacy invasion in business environmentsManuel Lafond, Pierre-Olivier Brosseau, Esma Aïmeur. 221-224 [doi]
- DLAS: Data Location Assurance Service for cloud computing environmentsAli Nur Mohammad Noman, Carlisle M. Adams. 225-228 [doi]
- A distributed platform of high interaction honeypots and experimental resultsIvan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata. 229-230 [doi]
- REM: A runtime browser extension manager with fine-grained access controlSaid Marouf, Mohamed Shehab, Adharsh Desikan. 231-232 [doi]
- Combining the setbase approach with negative databasesJulien Bringer, Hervé Chabanne, Olivier Cipiere. 233-234 [doi]
- 3rd edition of the workshop on trustworthy self-organizing systems (TSOS 2012)Christian Müller-Schloer, Wolfgang Reif, Jan-Philipp Steghöfer. 235 [doi]
- The role of trust in computer securityChristian Damsgaard Jensen. 236 [doi]
- Distributive and retributive justice in self-organising electronic institutionsJeremy Pitt. 237 [doi]
- Using conventional reasoning techniques for self-organising systemsGraeme Smith, Jeff W. Sanders. 238-243 [doi]
- Visualization of processes in self-learning systemsGabriele Peters, Kerstin Bunte, Marc Strickert, Michael Biehl, Thomas Villmann. 244-249 [doi]
- Using Trust to reduce wasteful computation in open Desktop Grid SystemsLukas Klejnowski, Yvonne Bernard, Christian Müller-Schloer, Jörg Hähner. 250-255 [doi]
- Secure collaboration in on boarding companiesPratap Chillakanti. 256-259 [doi]