Abstract is missing.
- How Much Network Security Must Be Visible in Web Browsers?Tobias Hirsch, Luigi Lo Iacono, Ina Wechsung. 1-16 [doi]
- A User-Level Authentication Scheme to Mitigate Web Session-Based VulnerabilitiesBastian Braun, Stefan Kucher, Martin Johns, Joachim Posegga. 17-29 [doi]
- Access Control Configuration for J2EE Web Applications: A Formal PerspectiveMatteo Maria Casalino, Romuald Thion, Mohand-Said Hacid. 30-35 [doi]
- Cloud Separation: Stuck Inside the CloudWaldo Delport, Martin S. Olivier. 36-49 [doi]
- Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment ProcessKashif Syed, Pavol Zavarsky, Dale Lindskog, Ron Ruhl, Shaun Aghili. 50-64 [doi]
- An Autonomous Social Web Privacy Infrastructure with Context-Aware Access ControlMichael Netter, Sabri Hassan, Günther Pernul. 65-78 [doi]
- A Prototype for Enforcing Usage Control Policies Based on XACMLAliaksandr Lazouski, Fabio Martinelli, Paolo Mori. 79-92 [doi]
- A Conceptual Framework for Trust ModelsFrancisco Moyano, M. Carmen Fernández Gago, Javier Lopez. 93-104 [doi]
- Advances and Challenges in Standalone Host-Based Intrusion Detection SystemsVit Bukac, Pavel Tucek, Martin Deutsch. 105-117 [doi]
- Encrypted Adaptive Storage Model - Analysis and Performance TestsMarcin Gorawski, Michal Lorek 0002, Michal Gorawski. 118-128 [doi]
- Efficient Comparison of Encrypted Biometric TemplatesMichael Dorn, Peter Wackersreuther, Christian Böhm. 129-142 [doi]
- Short and Efficient Identity-Based Undeniable Signature SchemeRouzbeh Behnia, Swee-Huay Heng, Che-Sheng Gan. 143-148 [doi]
- Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data BreachesGiuseppe D'Acquisto, Marta Flamini, Maurizio Naldi. 149-160 [doi]
- Flexible Regulation with Privacy PointsHanno Langweg, Lisa Rajbhandari. 161-166 [doi]
- On the Security of the Non-Repudiation of Forwarding ServiceRainer Schick, Christoph Ruland. 167-178 [doi]
- Profitability and Cost Management of Trustworthy Composite ServicesHisain Elshaafi, Jimmy McGibney, Dmitri Botvich. 179-191 [doi]
- Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical DatabasesTa Vinh Thong, Levente Buttyán. 192-206 [doi]
- Verification of Security Coherence in Data Warehouse DesignsAli Salem, Salah Triki, Hanêne Ben-Abdallah, Nouria Harbi, Omar Boussaid. 207-213 [doi]
- Towards the Secure Provision and Consumption in the Internet of ServicesLuca Viganò. 214-215 [doi]
- WebSand: Server-Driven Outbound Web-Application SandboxingMartin Johns, Joachim Posegga. 216-217 [doi]
- Attribute-Based Credentials for Trust (ABC4Trust)Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg. 218-219 [doi]
- uTRUSTit - Usable Trust in the Internet of ThingsChristina Hochleitner, Cornelia Graf, Peter Wolkerstorfer, Manfred Tscheligi. 220-221 [doi]
- Challenges for Advanced Security Monitoring - The MASSIF ProjectRoland Rieke, Elsa Prieto, Rodrigo Diaz, Hervé Debar, Andrew Hutchison. 222-223 [doi]
- Decentralized, Cooperative, Secure and Privacy - Aware Monitoring for TrustworthinessSathya Rao. 224-226 [doi]
- PASSIVE: Policy-Assessed System-Level Security of Sensitive Information Processing in Virtualised EnvironmentsPanagiotis Rizomiliotis, Charalambos Skianis. 227-228 [doi]
- Policy and Security Configuration ManagementHenrik Plate. 229-231 [doi]
- Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract)Markus Wehner, Sven Zeisberg, Nouha Oualha, Alexis Olivereau, Mike Ludwig, Dan Tudose, Laura Gheorghe, Emil Slusanschi, Basil Hess, Felix von Reischach, David Bateman. 232-233 [doi]
- Aniketos: Challenges and ResultsMiguel Ponce de Leon, Richard Sanders, Per Håkon Meland, Marina Egea, Zeta Dooly. 234-235 [doi]
- Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management ConsiderationsAggeliki Tsohou, Habin Lee, Yacine Rebahi, Mateusz Khalil, Simon Hohberg. 236-237 [doi]
- Secure Embedded Platform with Advanced Process Isolation and Anonymity CapabilitiesMarc-Michael Bergfeld, Holger Bock, Roderick Bloem, Jan Blonk, Gregory Conti, Kurt Dietrich, Matthias Junk, Florian Schreiner, Stephan Spitz, Johannes Winter. 238-239 [doi]