Abstract is missing.
- Distributed Intelligence: Trends in the Management of Complex SystemsSeraphin B. Calo, Dinesh C. Verma, Elisa Bertino. 1-7 [doi]
- A Flexible Authorization Architecture for Systems of Interoperable Medical DevicesQais Tasali, Chandan Chowdhury, Eugene Y. Vasserman. 9-20 [doi]
- Uncoupling Biometrics from Templates for Secure and Privacy-Preserving AuthenticationAysajan Abidin, Enrique Argones-Rúa, Roel Peeters. 21-29 [doi]
- On Risk in Access Control EnforcementGiuseppe Petracca, Frank Capobianco, Christian Skalka, Trent Jaeger. 31-42 [doi]
- FACT: Functionality-centric Access Control System for IoT Programming FrameworksSangHak Lee, Jiwon Choi, Jihun Kim, Beumjin Cho, Sangho Lee 0001, Hanjun Kim, Jong Kim 0001. 43-54 [doi]
- An Enforcement Model for Preventing Inference Attacks in Social Computing PlatformsSeyed Hossein Ahmadinejad, Philip W. L. Fong. 55-66 [doi]
- Secure Pick Up: Implicit Authentication When You Start Using the SmartphoneWei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, Ruby B. Lee. 67-78 [doi]
- Attribute Expressions, Policy Tables and Attribute-Based Access ControlJason Crampton, Conrad Williams. 79-90 [doi]
- A Datalog Framework for Modeling Relationship-based Access Control PoliciesEdelmira Pasarella, Jorge Lobo. 91-102 [doi]
- Towards a Top-down Policy Engineering Framework for Attribute-based Access ControlMasoud Narouei, Hamed Khanpour, Hassan Takabi, Natalie Parde, Rodney D. Nielsen. 103-114 [doi]
- Poster: A Location-Privacy Approach for Continuous QueriesDouglas Steiert, Dan Lin, Quincy Conduff, Wei Jiang. 115-117 [doi]
- Poster: Design of an Anomaly-based Threat Detection & Explication SystemRobert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke, Edgar R. Weippl. 119-120 [doi]
- Poster: Constrained Policy Mining in Attribute Based Access ControlMayank Gautam, Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. 121-123 [doi]
- POSTER: Access Control Model for the Hadoop EcosystemMaanak Gupta, Farhan Patwa, Ravi Sandhu. 125-127 [doi]
- Poster: On the Safety and Efficiency of Virtual Firewall Elasticity ControlHongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han. 129-131 [doi]
- Leveraging Hardware Isolation for Process Level Access Control & AuthenticationSyed Kamran Haider, Hamza Omar, Ilia A. Lebedev, Srinivas Devadas, Marten van Dijk. 133-141 [doi]
- A Framework for the Cryptographic Enforcement of Information Flow PoliciesJames Alderman, Jason Crampton, Naomi Farley. 143-154 [doi]
- Towards PII-based Multiparty Access Control for Photo Sharing in Online Social NetworksNishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn. 155-166 [doi]
- Verifiable Assume-Guarantee Privacy Specifications for Actor Component ArchitecturesClaiborne Johnson, Thomas MacGahan, John Heaps, Kevin Baldor, Jeffery von Ronne, Jianwei Niu 0001. 167-178 [doi]
- Authorization Enforcement DetectionEhood Porat, Shmuel Tikochinski, Ariel Stulman. 179-182 [doi]
- Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem DeploymentMaanak Gupta, Farhan Patwa, James Benson, Ravi Sandhu. 183-190 [doi]
- Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming LanguageThomas MacGahan, Claiborne Johnson, Armando Rodriguez, Jeffery von Ronne, Jianwei Niu 0001. 191-198 [doi]
- NTApps: A Network Traffic Analyzer of Android ApplicationsRodney Rodriguez, Shaikh Mostafa, Xiaoyin Wang. 199-206 [doi]
- On the Satisfiability of Workflows with Release PointsJason Crampton, Gregory Gutin, Rémi Watrigant. 207-217 [doi]
- A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party AnalyticsShagufta Mehnaz, Gowtham Bellala, Elisa Bertino. 219-230 [doi]
- Enabling Data Sharing in Contextual Environments: Policy Representation and AnalysisErisa Karafili, Emil C. Lupu. 231-238 [doi]
- Mining Relationship-Based Access Control PoliciesThang Bui, Scott D. Stoller, Jiajie Li. 239-246 [doi]
- Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information SystemsPaolo Guarda, Silvio Ranise, Hari Siswantoro. 247-254 [doi]
- A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health RecordsHarsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk. 255-262 [doi]