Abstract is missing.
- Coalitional games for the management of anonymous access in online social networksEsther Palomar, Almudena Alcaide, Elisenda Molina, Yan Zhang. 1-10 [doi]
- Key privacy and anonymous protocolsPaolo D'Arco, Alfredo De Santis. 11-18 [doi]
- Selective cloaking: Need-to-know for location-based appsBenjamin Henne, Christian Kater, Matthew Smith, Michael Brenner. 19-26 [doi]
- Differential privacy via t-closeness in data publishingJordi Soria-Comas, Josep Domingo-Ferrer. 27-35 [doi]
- Allowing privacy-preserving analysis of social network likesFrancesco Buccafurri, Lidia Fotia, Gianluca Lax. 36-43 [doi]
- A self-adaptive classification for the dissociating privacy agentMarc Juárez, Vicenç Torra. 44-50 [doi]
- Blend me in: Privacy-preserving input generalization for personalized online servicesAlegria Baquero, Allan M. Schiffman, Jeff Shrager. 51-60 [doi]
- Traceability analysis of quadratic residue-based RFID authentication protocolsZahra Sohrabi-Bonab, Mahdi R. Alaghband, Mohammad Reza Aref. 61-68 [doi]
- Privacy-preserving social recommendations in geosocial networksBisheng Liu, Urs Hengartner. 69-76 [doi]
- A novel privacy preserving keyword searching for cloud storageLin Cheng, Zhengping Jin, Oiaovan Wen, Hua Zhang. 77-81 [doi]
- Secure rendering process in cloud computingMohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, Madjid Merabti. 82-87 [doi]
- Aegis: A semantic implementation of privacy as contextual integrity in social ecosystemsImrul Kayes, Adriana Iamnitchi. 88-97 [doi]
- Pseudonymous communications in secure industrial wireless sensor networksNouha Oualha, Alexis Olivereau, Aymen Boudguiga. 98-102 [doi]
- A peer-to-peer agent community for digital oblivion in online social networksKlara Stokes, Niklas Carlsson. 103-110 [doi]
- How people care about their personal data released on social mediaKellyton dos Santos Brito, Frederico Araujo Durão, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira. 111-118 [doi]
- Identifying individual vulnerability based on public dataJohn Ferro, Lisa Singh, Micah Sherr. 119-126 [doi]
- HALT: Hybrid anonymization of longitudinal transactionsMorvarid Sehatkar, Stan Matwin. 127-134 [doi]
- An NFC based consumer-level counterfeit detection frameworkMuhammad Qasim Saeed, Zeeshan Bilal, Colin D. Walter. 135-142 [doi]
- Hot-patching a web server: A case study of ASAP code repairMathias Payer, Thomas R. Gross. 143-150 [doi]
- SPIKE: A novel session key management protocol with time-varying secure cluster formation in wireless sensor networksSutirtha Sanyal. 151-160 [doi]
- An efficient and provably-secure coercion-resistant e-voting protocolAlireza Toroghi Haghighat, Mohammad Sadeq Dousti, Rasool Jalili. 161-168 [doi]
- Model-based specification and refinement of usage control policiesRicardo Neisse, Joerg Doerr. 169-176 [doi]
- Design and implementation of multi-user secure indices for encrypted cloud storageMao-Pang Pang Lin, Wei-Chih Hong, Chih Hung Chen, Chen-Mou Cheng. 177-184 [doi]
- Targeted attacks detection with SPuNgeMarco Balduzzi, Vincenzo Ciangaglini, Robert McArdle. 185-194 [doi]
- Contextual feature based one-class classifier approach for detecting video response spam on YouTubeVidushi Chaudhary, Ashish Sureka. 195-204 [doi]
- Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynetMarkus Gruber, Christian Schanes, Florian Fankhauser, Thomas Grechenig. 205-212 [doi]
- The role of phone numbers in understanding cyber-crime schemesAndrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurélien Francillon, Davide Balzarotti. 213-220 [doi]
- Policy templates for relationship-based access controlEvangelos Aktoudianakis, Jason Crampton, Steve Schneider, Helen Treharne, Adrian Waller. 221-228 [doi]
- A multi-tenant RBAC model for collaborative cloud servicesBo Tang, Qi Li, Ravi Sandhu. 229-238 [doi]
- Error-rate-based fusion of biometric expertsMads I. Ingwar, Naveed Ahmed, Christian Damsgaard Jensen. 239-246 [doi]
- A provenance-based access control model for dynamic separation of dutiesDang Nguyen, Jaehong Park, Ravi S. Sandhu. 247-256 [doi]
- Multi-data-types interval decision diagrams for XACML evaluation engineCanh Ngo, Marc X. Makkes, Yuri Demchenko, Cees de Laat. 257-266 [doi]
- Writing down your password: Does it help?Vanessa Boothroyd, Sonia Chiasson. 267-274 [doi]
- SSAS: A simple secure addressing scheme for IPv6 autoconfigurationHosnieh Rafiee, Christoph Meinel. 275-282 [doi]
- Extended structural balance theory for modeling trust in social networksYi Qian, Sibel Adali. 283-290 [doi]
- TrustForge: Flexible access control for collaborative crowd-sourced environmentJian Chang, Peter Gebhard, Andreas Haeberlen, Zachary G. Ives, Insup Lee, Oleg Sokolsky, Krishna K. Venkatasubramanian. 291-300 [doi]
- Efficient polynomial delegation under standard assumptionsPaz Morillo, Marc Obrador. 301-308 [doi]
- Socio-technical formal analysis of TLS certificate validation in modern browsersGiampaolo Bella, Rosario Giustolisi, Gabriele Lenzini. 309-316 [doi]
- Trust-based decision-making for the adaptation of public displays in changing social contextsEkaterina Kurdjokova, Michael Wißner, Stephan Hammer, Elisabeth André. 317-324 [doi]
- Semi-automated assessment of annotation trustworthinessDavide Ceolin, Archana Nottamkandath, Wan Fokkink. 325-332 [doi]
- Communicating trustworthiness using radar graphs: A detailed lookJason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts. 333-339 [doi]
- Leveraging platoon dispersion for Sybil detection in vehicular networksMuhammad Al Mutaz, Levi Malott, Sriram Chellappan. 340-347 [doi]
- Towards engineering trust systems: Template-based, component-oriented assemblySarah Magin, Sascha Hauke. 348-351 [doi]
- Improving security of virtual machines during live migrationsSebastian Biedermann, Martin Zittel, Stefan Katzenbeisser. 352-357 [doi]
- Providing useful and private Web search by means of social network profilingAlexandre Viejo, David Sánchez 0001. 358-361 [doi]
- Define privacy-preserving setbase drawer size standard: A ∊-closeness perspectiveBenjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere. 362-365 [doi]
- Encouraging second thoughts: Obstructive user interfaces for raising security awarenessTim Storer, Stephen Marsh, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs, Karen Renaud, Mehmet Vefa Bicakci. 366-368 [doi]
- Real-time malicious fast-flux detection using DNS and bot related featuresSergi Martinez-Bea, Sergio Castillo-Perez, Joaquín García-Alfaro. 369-372 [doi]
- Top-down itemset recoding for releasing private complex dataTsubasa Takahashi, Koji Sobataka, Takao Takenouchi, Yuki Toyoda, Takuya Mori, Takahide Kohro. 373-376 [doi]
- Device Comfort for mobile health information accessibilityStephen Marsh, Yao Wang, Sylvie Noël, Lewis Robart, John A. Stewart. 377-380 [doi]
- An implementation of secure multi-party computations to preserve privacy when processing EMR dataAnders Andersen. 381-384 [doi]