Abstract is missing.
- Indistinguishability: The Other Aspect of PrivacyChao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia. 1-17 [doi]
- Sovereign Information Sharing Among Malicious PartnersStefan Böttcher, Sebastian Obermeier. 18-29 [doi]
- Temporal Context Lie Detection and GenerationXiangdong An, Dawn N. Jutla, Nick Cercone. 30-47 [doi]
- Secure Anonymization for Incremental DatasetsJi-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li. 48-63 [doi]
- Difference Set Attacks on Conjunctive Keyword Search SchemesHyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong-Hoon Lee. 64-74 [doi]
- Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted DataJin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong-Hoon Lee. 75-83 [doi]
- Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned DatabasesP. Krishna Prasad, C. Pandu Rangan. 84-99 [doi]
- Conflict of Interest in the Administrative Role Graph ModelYunyu Song, Sylvia L. Osborn. 100-114 [doi]
- Two Phase Filtering for XML Access ControlChangwoo Byun, Seog Park. 115-130 [doi]
- Hybrid Authorizations and Conflict ResolutionAmir H. Chinaei, Huaxin Zhang. 131-145 [doi]
- Analysis of a Database and Index Encryption Scheme - Problems and FixesUlrich Kühn. 146-159 [doi]
- Information Disclosure by XPath QueriesStefan Böttcher, Rita Steinmetz. 160-174 [doi]
- SPIDER: An Autonomic Computing Approach to Database Security ManagementHakan Hacigümüs. 175-183 [doi]