Abstract is missing.
- User Profiling and Re-identification: Case of University-Wide Network AnalysisMarek Kumpost, Vashek Matyas. 1-10 [doi]
- Search Engines: Gateway to a New Panopticon ?Eleni Kosta, Christos Kalloniatis, Lilian Mitrou, Evangelia Kavakli. 11-21 [doi]
- Supporting Local Aliases as Usable Presentation of Secure PseudonymsElke Franz, Katja Liesebach. 22-31 [doi]
- A Privacy-Preserving Platform for User-Centric Quantitative BenchmarkingDominik Herrmann, Florian Scheuer, Philipp Feustel, Thomas Nowey, Hannes Federrath. 32-41 [doi]
- An Anonymous Credit Card SystemElli Androulaki, Steven M. Bellovin. 42-51 [doi]
- A Cluster-Based Framework for the Security of Medical Sensor EnvironmentsEleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis. 52-62 [doi]
- Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based ApproachAlessandro Armando, Enrico Giunchiglia, Serena Elisa Ponta. 63-72 [doi]
- A Formalization of HIPAA for a Medical Messaging SystemPeifung E. Lam, John C. Mitchell, Sharada Sundaram. 73-85 [doi]
- Adaptive Dispatching of Incidences Based on Reputation for SCADA SystemsCristina Alcaraz, Isaac Agudo, M. Carmen Fernández Gago, Rodrigo Roman, Gerardo Fernandez, Javier Lopez. 86-94 [doi]
- Steering Security through MeasurementJosé Manuel Torres, Jose Maria Sarriegi, Josune Hernantes, Ana Lauge. 95-104 [doi]
- Advanced Features in Bayesian Reputation SystemsAudun Jøsang, Walter Quattrociocchi. 105-114 [doi]
- An MDA-Based Environment for Generating Access Control PoliciesHeiko Klarl, Florian Marmé, Christian Wolff, Christian Emig, Sebastian Abeck. 115-126 [doi]
- An Extended Role-Based Access Control Model for Delegating ObligationsMeriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula. 127-137 [doi]
- The OPL Access Control Policy LanguageChristopher Alm, Ruben Wolf, Joachim Posegga. 138-148 [doi]
- Operational Semantics for DKAL: Application and AnalysisYuri Gurevich, Arnab Roy. 149-158 [doi]
- ::::HB:::: - ::::MAC::::: Improving the ::::Random:::: - ::::HB:::::::#::: Authentication ProtocolPanagiotis Rizomiliotis. 159-168 [doi]