Abstract is missing.
- Maintaining Trustworthiness of Socio-Technical Systems at Run-TimeNazila Gol Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, Bassem I. Nasser, Mike Surridge. 1-12 [doi]
- Trust Relationships in Privacy-ABCs' EcosystemsAhmad Sabouri, Ioannis Krontiris, Kai Rannenberg. 13-23 [doi]
- Android Malware Detection Based on Software Complexity MetricsMykola Protsenko, Tilo Müller. 24-35 [doi]
- A Decision Support System for IT Security Incident ManagementGerhard Rauchecker, Emrah Yasasin, Guido Schryen. 36-47 [doi]
- Trust Evaluation of a System for an Activity with Subjective LogicNagham Alhadad, Yann Busnel, Patricia Serrano-Alvarado, Philippe Lamarre. 48-59 [doi]
- A Hash-Based Index Method for Securing Biometric Fuzzy VaultsThi-Thuy Linh-Vo, Tran Khanh Dang, Josef Küng. 60-71 [doi]
- A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal DomainYoungbae Song, Hyoungshick Kim, Aziz Mohaisen. 72-82 [doi]
- Towards an Understanding of the Formation and Retention of Trust in Cloud Computing: A Research Agenda, Proposed Research Methods and Preliminary ResultsMarc Walterbusch, Frank Teuteberg. 83-93 [doi]
- Privacy-Aware Cloud Deployment Scenario SelectionKristian Beckers, Stephan Faßbender, Stefanos Gritzalis, Maritta Heisel, Christos Kalloniatis, Rene Meis. 94-105 [doi]
- Closing the Gap between the Specification and Enforcement of Security PoliciesJosé-Miguel Horcas, Mónica Pinto, Lidia Fuentes. 106-118 [doi]
- Business Process Modeling for Insider Threat Monitoring and HandlingVasilis Stavrou, Miltiadis Kandias, Georgios Karoulas, Dimitris Gritzalis. 119-131 [doi]
- A Quantitative Analysis of Common Criteria Certification PracticeSamuel Paul Kaluvuri, Michele Bezzi, Yves Roudier. 132-143 [doi]
- A Normal-Distribution Based Reputation ModelAhmad Abdel-Hafez, Yue Xu, Audun Jøsang. 144-155 [doi]
- Differences between Android and iPhone Users in Their Security and Privacy AwarenessLena Reinfelder, Zinaida Benenson, Freya Gassmann. 156-167 [doi]
- User Acceptance of Footfall Analytics with Aggregated and Anonymized Mobile Phone DataAlfred Kobsa. 168-179 [doi]
- A Protocol for Intrusion Detection in Location Privacy-Aware Wireless Sensor NetworksJirí Kur, Vashek Matyás. 180-190 [doi]