Abstract is missing.
- Cost-Aware Runtime Enforcement of Security PoliciesPeter Drábik, Fabio Martinelli, Charles Morisset. 1-16 [doi]
- Enforcing More with Less: Formalizing Target-Aware Run-Time MonitorsYannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Jay Ligatti. 17-32 [doi]
- Lazy Security ControllersGiulio Caravagna, Gabriele Costa, Giovanni Pardini. 33-48 [doi]
- Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable ActivitiesMichele Barletta, Silvio Ranise, Luca Viganò. 49-64 [doi]
- Labeled Goal-Directed Search in Access Control LogicValerio Genovese, Deepak Garg, Daniele Rispoli. 65-80 [doi]
- A Use-Based Approach for Enhancing UCONChristos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis. 81-96 [doi]
- Analysis of Communicating Authorization PoliciesSimone Frau, Mohammad Torabi Dashti. 97-112 [doi]
- Building Trust and Reputation In: A Development Framework for Trust Models ImplementationFrancisco Moyano, M. Carmen Fernández Gago, Javier Lopez. 113-128 [doi]
- Matrix Powers Algorithms for Trust Evaluation in Public-Key InfrastructuresJean-Guillaume Dumas, Hicham Hossayni. 129-144 [doi]
- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care PrivacyMeilof Veeningen, Benne de Weger, Nicola Zannone. 145-160 [doi]
- Switchwall: Automated Topology Fingerprinting and Behavior Deviation IdentificationNelson Nazzicari, Javier Almillategui, Angelos Stavrou, Sushil Jajodia. 161-176 [doi]
- DOT-COM: Decentralized Online Trading and COMmerceMoti Geva, Amir Herzberg. 177-192 [doi]
- Formalizing Physical Security ProceduresCatherine Meadows, Dusko Pavlovic. 193-208 [doi]
- A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged ItemsSjouke Mauw, Selwyn Piramuthu. 209-224 [doi]
- Authenticating Email Search ResultsOlga Ohrimenko, Hobart Reynolds, Roberto Tamassia. 225-240 [doi]
- Software Authentication to Enhance Trust in Body Sensor NetworksJoep A. de Groot, Vinh Bui, Jean-Paul M. G. Linnartz, Johan Lukkien, Richard Verhoeven. 241-256 [doi]
- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSMRobert Künnemann, Graham Steel. 257-272 [doi]
- Boosting Model Checking to Analyse Large ARBAC PoliciesSilvio Ranise, Anh Truong, Alessandro Armando. 273-288 [doi]
- Constrained Role MiningCarlo Blundo, Stelvio Cimato. 289-304 [doi]
- A Datalog Semantics for ParalocksBart van Delft, Niklas Broberg, David Sands. 305-320 [doi]