Abstract is missing.
- A bodyguard of lies: the use of honey objects in information securityAri Juels. 1-4 [doi]
- Hardware-enhanced distributed access enforcement for role-based access controlGedare Bloom, Rahul Simha. 5-16 [doi]
- An access control concept for novel automotive HMI systemsSimon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer. 17-28 [doi]
- Monitor placement for large-scale systemsNirupama Talele, Jason Teutsch, Robert F. Erbacher, Trent Jaeger. 29-40 [doi]
- Anomaly detection and visualization in generative RBAC modelsMaria Leitner, Stefanie Rinderle-Ma. 41-52 [doi]
- Reduction of access control decisionsCharles Morisset, Nicola Zannone. 53-62 [doi]
- Sorting out role based access controlWouter Kuijper, Victor Ermolaev. 63-74 [doi]
- Towards more usable information flow policies for contemporary operating systemsWai-Kit Sze, Bhuvan Mital, R. Sekar. 75-84 [doi]
- Attribute based access control for APIs in spring securityAlessandro Armando, Roberto Carbone, Eyasu Getahun Chekole, Silvio Ranise. 85-88 [doi]
- Comprehensive integrity protection for desktop linuxWai-Kit Sze, R. Sekar. 89-92 [doi]
- Game theoretic analysis of multiparty access control in online social networksHongxin Hu, Gail-Joon Ahn, Ziming Zhao, Dejun Yang. 93-102 [doi]
- Scalable and precise automated analysis of administrative temporal role-based access controlSilvio Ranise, Anh Truong, Alessandro Armando. 103-114 [doi]
- Access control models for geo-social computing systemsEbrahim Tarameshloo, Philip W. L. Fong. 115-126 [doi]
- What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?Lujo Bauer, Florian Kerschbaum. 127-128 [doi]
- Limiting access to unintentionally leaked sensitive documents using malware signaturesMordechai Guri, Gabi Kedma, Buky Carmeli, Yuval Elovici. 129-140 [doi]
- Optimized and controlled provisioning of encrypted outsourced dataAndreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard. 141-152 [doi]
- User-centric identity as a service-architecture for eIDs with selective attribute disclosureDaniel Slamanig, Klaus Stranacher, Bernd Zwattendorfer. 153-164 [doi]
- Towards fine grained RDF access controlJyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani M. Thuraisingham. 165-176 [doi]
- Redaction based RDF access control languageJyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani M. Thuraisingham. 177-180 [doi]
- A system for risk awareness during role miningSharmin Ahmed, Sylvia L. Osborn. 181-184 [doi]
- Re-thinking networked privacy, security, identity and access control in our surveillance statesAndrew Clement. 185-186 [doi]
- Path conditions and principal matching: a new approach to access controlJason Crampton, James Sellwood. 187-198 [doi]
- An actor-based, application-aware access control evaluation frameworkWilliam C. Garrison III, Adam J. Lee, Timothy L. Hinrichs. 199-210 [doi]
- Policy models to protect resource retrievalHayawardh Vijayakumar, Xinyang Ge, Trent Jaeger. 211-222 [doi]