Abstract is missing.
- An Auto-delegation Mechanism for Access Control SystemsJason Crampton, Charles Morisset. 1-16 [doi]
- Automated Symbolic Analysis of ARBAC-PoliciesAlessandro Armando, Silvio Ranise. 17-34 [doi]
- Influence of Attribute Freshness on Decision Making in Usage ControlLeanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin. 35-50 [doi]
- Rewrite Specifications of Access Control Policies in Distributed EnvironmentsClara Bertolissi, Maribel Fernández. 51-67 [doi]
- A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management - Automated Software Distribution for AirplanesPeter Hartmann, Monika Maidl, David von Oheimb, Richard Robinson. 68-83 [doi]
- GUTS: A Framework for Adaptive and Configureable Grid User Trust ServiceIoanna Dionysiou, K. Harald Gjermundrød, David E. Bakken. 84-99 [doi]
- Aggregating Trust Using Triangular Norms in the KeyNote Trust Management SystemSimon N. Foley, Wayne Mac Adams, Barry O'Sullivan. 100-115 [doi]
- An Authentication Trust Metric for Federated Identity Management SystemsHidehito Gomi. 116-131 [doi]
- A Trust-Augmented Voting Scheme for Collaborative Privacy ManagementYanjie Sun, Chenyi Zhang, Jun Pang, Baptiste Alcalde, Sjouke Mauw. 132-146 [doi]
- Universally Composable NIZK Protocol in an Internet Voting SchemeMd. Abdul Based, Stig Fr. Mjølsnes. 147-162 [doi]
- Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPARalf Sasse, Santiago Escobar, Catherine Meadows, José Meseguer. 163-178 [doi]
- Defamation-Free Networks through User-Centered Data ControlNadim Sarrouh, Florian Eilers, Uwe Nestmann, Ina Schieferdecker. 179-193 [doi]
- InDico: Information Flow Analysis of Business Processes for Confidentiality RequirementsRafael Accorsi, Claus Wonnemann. 194-209 [doi]
- Stateful Authorization Logic: - Proof Theory and a Case StudyDeepak Garg, Frank Pfenning. 210-225 [doi]
- Privacy-Friendly Energy-Metering via Homomorphic EncryptionFlavio D. Garcia, Bart Jacobs. 226-238 [doi]
- Extending an RFID Security and Privacy Model by Considering Forward UntraceabilityMete Akgün, Mehmet Ufuk Çaglayan. 239-254 [doi]
- Protecting Privacy of Sensitive Value Distributions in Data ReleaseMichele Bezzi, Sabrina De Capitani di Vimercati, Giovanni Livraga, Pierangela Samarati. 255-270 [doi]