Abstract is missing.
- Log Design for AccountabilityDenis Butin, Marcos Chicote, Daniel Le Métayer. 1-7 [doi]
- An Integrated Formal Approach to Usage ControlPiero A. Bonatti, Luigi Sauro, Marco Faella, Clemente Galdi. 8-12 [doi]
- How Usage Control and Provenance Tracking Get Together - A Data Protection PerspectiveChristoph Bier. 13-17 [doi]
- The Cloud Needs Cross-Layer Data Handling AnnotationsMartin Henze, René Hummen, Klaus Wehrle. 18-22 [doi]
- Privacy Preserving Data Analytics for Smart HomesAntorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong. 23-27 [doi]
- Preventive Inference Control in Data-centric Business ModelsRafael Accorsi, Guenter Mueller. 28-33 [doi]
- The Probabilistic Provenance GraphNwokedi C. Idika, Mayank Varia, Harry Phan. 34-41 [doi]
- "I hereby leave my email to...": Data Usage Control and the Digital EstateStephan Micklitz, Martin Ortlieb, Jessica Staddon. 42-44 [doi]
- Multi-Domain Information Fusion for Insider Threat DetectionHoda Eldardiry, Evgeniy Bart, Juan Liu, John Hanley, Bob Price, Oliver Brdiczka. 45-51 [doi]
- System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture ModelsYingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo. 52-59 [doi]
- Use of Domain Knowledge to Detect Insider Threats in Computer ActivitiesWilliam T. Young, Henry G. Goldberg, Alex Memory, James F. Sartain, Ted E. Senator. 60-67 [doi]
- Reporting Insider Threats via Covert ChannelsDavid N. Muchene, Klevis Luli, Craig A. Shue. 68-71 [doi]
- Differentiating User Authentication GraphsAlexander D. Kent, Lorie M. Liebrock. 72-75 [doi]
- Invalidating Policies using Structural InformationFlorian Kammüller, Christian W. Probst. 76-81 [doi]
- A Bayesian Network Model for Predicting Insider ThreatsElise T. Axelrad, Paul J. Sticha, Oliver Brdiczka, Jianqiang Shen. 82-89 [doi]
- Methods and Metrics for Evaluating Analytic Insider Threat ToolsFrank L. Greitzer, Thomas A. Ferryman. 90-97 [doi]
- Bridging the Gap: A Pragmatic Approach to Generating Insider Threat DataJoshua Glasser, Brian Lindauer. 98-104 [doi]
- On Bad Randomness and Cloning of Contactless Payment and Building Smart CardsNicolas T. Courtois, Daniel Hulme, Kumail Hussain, Jerzy A. Gawinecki, Marek Grajek. 105-110 [doi]
- Understanding Network Forensics Analysis in an Operational EnvironmentElias Raftopoulos, Xenofontas A. Dimitropoulos. 111-118 [doi]
- Digital Forensic Reconstruction of a Program ActionAhmed F. Shosha, Lee Tobin, Pavel Gladyshev. 119-122 [doi]
- Craigslist Scams and Community Composition: Investigating Online Fraud VictimizationVaibhav Garg, Shirin Nilizadeh. 123-126 [doi]
- On Evaluating IP Traceback Schemes: A Practical PerspectiveVahid Aghaei Foroushani, A. Nur Zincir-Heywood. 127-134 [doi]
- Do Private and Portable Web Browsers Leave Incriminating Evidence? A Forensic Analysis of Residual Artifacts from Private and Portable Web Browsing SessionsDonny Jacob Ohana, Narasimha Shashidhar. 135-142 [doi]
- Inside the SCAM Jungle: A Closer Look at 419 Scam Email OperationsJelena Isacenkova, Olivier Thonnard, Andrei Costin, Davide Balzarotti, Aurélien Francillon. 143-150 [doi]
- StegTorrent: A Steganographic Method for the P2P File Sharing ServicePawel Kopiczko, Wojciech Mazurczyk, Krzysztof Szczypiorski. 151-157 [doi]
- Steganography in OFDM Symbols of Fast IEEE 802.11n NetworksSzymon Grabski, Krzysztof Szczypiorski. 158-164 [doi]
- Quantitative Assessment of Risk Reduction with Cybercrime Black Market MonitoringLuca Allodi, Woohyun Shim, Fabio Massacci. 165-172 [doi]
- Preventing Cell Phone Intrusion and Theft using BiometricsDonny Jacob Ohana, Liza Phillips, Lei Chen. 173-180 [doi]