Abstract is missing.
- How Anonymous Is k-Anonymous? Look at Your Quasi-IDClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia. 1-15 [doi]
- Simulatable Binding: Beyond Simulatable AuditingLei Zhang, Sushil Jajodia, Alexander Brodsky. 16-31 [doi]
- ARUBA: A Risk-Utility-Based Algorithm for Data DisclosureMohamed R. Fouad, Guy Lebanon, Elisa Bertino. 32-49 [doi]
- Responding to Anomalous Database RequestsAshish Kamra, Elisa Bertino, Rimma V. Nehme. 50-66 [doi]
- Auditing Inference Based Disclosures in Dynamic DatabasesVikram Goyal, Shyam K. Gupta, Manish Singh, Anand Gupta. 67-81 [doi]
- An Approach to Evaluate Data Trustworthiness Based on Data ProvenanceChenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu. 82-98 [doi]
- Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust NegotiationsPhilipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke. 99-118 [doi]
- A Trusted Approach to E-CommerceGiannakis Antoniou, Lynn Margaret Batten, Parampalli Udaya. 119-132 [doi]
- A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case StudyGabriele Gianini, Ernesto Damiani. 133-150 [doi]
- Query Rewriting for Access Control on Semantic WebJian Li, William K. Cheung. 151-168 [doi]
- On the Facilitation of Fine-Grained Access to Distributed Healthcare DataMark Slaymaker, David J. Power, Douglas Russell, Andrew Simpson. 169-184 [doi]
- A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in HealthcareLuan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker. 185-198 [doi]
- A Methodology for Bridging between RBAC and an Arbitrary Application ProgramCandy Wai-Yue Shum, Sylvia L. Osborn, He Wang. 199-208 [doi]
- An Anonymity Model Achievable Via MicroaggregationJosep Domingo-Ferrer, Francesc Sebé, Agusti Solanas. 209-218 [doi]
- Engineering Privacy Requirements in Business Intelligence ApplicationsAnnamaria Chiasera, Fabio Casati, Florian Daniel, Yannis Velegrakis. 219-228 [doi]