Abstract is missing.
- The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data ControllersCostas Lambrinoudakis. 3-8 [doi]
- An Inquiry into Perception and Usage of Smartphone Permission ModelsLena Reinfelder, Andrea Schankin, Sophie Russ, Zinaida Benenson. 9-22 [doi]
- On the Hardness of Separation of Duties Problems for Cloud DatabasesFerdinand Bollwein, Lena Wiese. 23-38 [doi]
- Three Tales of Disillusion: Benchmarking Property Preserving Encryption SchemesFrank Pallas, Martin Grambow. 39-54 [doi]
- Evaluating the Privacy Properties of Secure VoIP MetadataJoão S. Resende, Patrícia R. Sousa, Luís Antunes 0002. 57-68 [doi]
- Can Spatial Transformation-Based Privacy Preservation Compromise Location Privacy?Anand Paturi, Subhasish Mazumdar. 69-84 [doi]
- Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk AssessmentMajed Alshammari, Andrew Simpson. 85-99 [doi]
- PERSUADED: Fighting Social Engineering Attacks with a Serious GameDina Aladawy, Kristian Beckers, Sebastian Pape 0001. 103-118 [doi]
- Developing and Evaluating a Five Minute Phishing Awareness VideoMelanie Volkamer, Karen Renaud, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber. 119-134 [doi]
- Biometrically Linking Document Leakage to the Individuals ResponsibleAbdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell. 135-149 [doi]
- A Decision-Making Approach for Improving Organizations' Cloud Forensic ReadinessStavros Simou, Ioannis Troumpis, Christos Kalloniatis, Dimitris Kavroudakis, Stefanos Gritzalis. 150-164 [doi]
- Towards Blockchain-Based Identity and Access Management for Internet of Things in EnterprisesMartin Nuss, Alexander Puchta, Michael Kunz. 167-181 [doi]
- Access Control Requirements for Physical Spaces Protected by Virtual PerimetersBrian Greaves, Marijke Coetzee, Wai Sze Leung. 182-197 [doi]
- Towards the Definition of a Security Incident Response Modelling LanguageMyrsini Athinaiou, Haralambos Mouratidis, Theo Fotis, Michalis Pavlidis, Emmanouil Panaousis. 198-212 [doi]
- An Enhanced Cyber Attack Attribution FrameworkNikolaos Pitropakis, Emmanouil Panaousis, Alkiviadis Giannakoulias, George Kalpakis, Rodrigo Diaz Rodriguez, Panayiotis Sarigiannidis. 213-228 [doi]
- A Comprehensive Methodology for Deploying IoT HoneypotsAntonio Acien, Ana Nieto, Gerardo Fernandez, Javier López 0001. 229-243 [doi]
- Trustworthiness Cases - Toward Preparation for the Trustworthiness CertificationNazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel. 244-259 [doi]