Abstract is missing.
- Mobile security and privacy: the quest for the mighty access controlAhmad-Reza Sadeghi. 1-2 [doi]
- Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy ruleOmar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne, Jared Bennatt, Anupam Datta, Limin Jia, William H. Winsborough. 3-14 [doi]
- Combining social authentication and untrusted clouds for private location sharingAndrew K. Adams, Adam J. Lee. 15-24 [doi]
- Private data warehouse queriesXun Yi, Russell Paulet, Elisa Bertino, Guandong Xu. 25-36 [doi]
- Evolving role definitions through permission invocation patternsWen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz, Bradley Malin. 37-48 [doi]
- Ensuring continuous compliance through reconciling policy with usageSuresh Chari, Ian Molloy, Youngja Park, Wilfried Teiken. 49-60 [doi]
- Least-restrictive enforcement of the Chinese wall security policyAlireza Sharifi, Mahesh V. Tripunitara. 61-72 [doi]
- Constraint expressions and workflow satisfiabilityJason Crampton, Gregory Gutin. 73-84 [doi]
- Panel on granularity in access controlIan Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri. 85-86 [doi]
- Searching over encrypted data in cloud systemsFlorian Kerschbaum. 87-88 [doi]
- Information flow control for stream processing in cloudsXing Xie, Indrakshi Ray, Raman Adaikkalavan, Rose Gamble. 89-100 [doi]
- An information flow control meta-modelDennis G. Kafura, Denis Gracanin. 101-112 [doi]
- HyXAC: a hybrid approach for XML access controlManogna Thimma, Tsam Kai Tsui, Bo Luo. 113-124 [doi]
- ERBAC: event-driven RBACPiero A. Bonatti, Clemente Galdi, Davide Torres. 125-136 [doi]
- Heuristic safety analysis of access control modelsPeter Amthor, Winfried E. Kühnhauser, Anja Pölck. 137-148 [doi]
- A white-box policy analysis and its efficient implementationJayalakshmi Balasubramaniam, Philip W. L. Fong. 149-160 [doi]
- On the notion of redundancy in access control policiesMarco Guarnieri, Mario Arrigoni Neri, Eros Magri, Simone Mutti. 161-172 [doi]
- Specification and analysis of access control policies for mobile applicationsRamadan Abdunabi, Indrakshi Ray, Robert B. France. 173-184 [doi]
- A bigData platform for analytics on access control policies and logsSuresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Wilfried Teiken. 185-188 [doi]
- Enabling intensional access control via preference-aware query optimizationNicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu. 189-192 [doi]
- RMiner: a tool set for role miningRuixuan Li, Huaqing Li, Wei Wang, Xiaopu Ma, Xiwu Gu. 193-196 [doi]
- Secure benchmarking in the cloudAxel Schröpfer, Andreas Schaad, Florian Kerschbaum, Heiko Boehm, Joerg Jooss. 197-200 [doi]
- A storage-efficient cryptography-based access control solution for subversionDominik Leibenger, Christoph Sorge. 201-212 [doi]
- Beyond accountability: using obligations to reduce risk exposure and deter insider attacksNathalie Baracaldo, James Joshi. 213-224 [doi]
- Property-testing real-world authorization systemsAlireza Sharifi, Paul Bottinelli, Mahesh V. Tripunitara. 225-236 [doi]
- User-centric management of distributed credential repositories: balancing availability and vulnerabilityJens Köhler, Jens Mittag, Hannes Hartenstein. 237-248 [doi]
- A versatile access control implementation: secure boxBruno Alves Pereira Botelho, Dennis Guimarães Pelluzi, Emilio Tissato Nakamura. 249-252 [doi]
- Permission path analysis based on access intelligenceDetlef Sturm, Axel Kern. 253-256 [doi]
- Sticky policies for mobile devicesFrancesco Di Cerbo, Slim Trabelsi, Thomas Steingruber, Gabriella Dodero, Michele Bezzi. 257-260 [doi]
- Content-based information protection and release in NATO operationsAlessandro Armando, Matteo Grasso, Sander Oudkerk, Silvio Ranise, Konrad Wrona. 261-264 [doi]