Abstract is missing.
- Monitoring Access Reviews by Crowd LabellingSebastian Groll, Sascha Kern, Ludwig Fuchs, Günther Pernul. 3-17 [doi]
- Automating the Evaluation of TrustworthinessMarc Sel, Chris J. Mitchell. 18-31 [doi]
- At Your Service 24/7 or Not? Denial of Service on ESInet SystemsZisis Tsiatsikas, Georgios Kambourakis, Dimitrios Geneiatakis. 35-49 [doi]
- Impact of False Positives and False Negatives on Security Risks in Transactions Under ThreatDoncho S. Donchev, Vassil Vassilev, Demir Tonchev. 50-66 [doi]
- Launching Adversarial Label Contamination Attacks Against Malicious URL DetectionBruno Marchand, Nikolaos Pitropakis, William J. Buchanan, Costas Lambrinoudakis. 69-82 [doi]
- Neither Good nor Bad: A Large-Scale Empirical Analysis of HTTP Security Response HeadersGeorgios Karopoulos, Dimitris Geneiatakis, Georgios Kambourakis. 83-95 [doi]
- Components and Architecture for the Implementation of Technology-Driven Employee Data ProtectionFlorian Dehling, Denis Feth, Svenja Polst, Bianca Steffes, Jan Tolsdorf. 99-111 [doi]
- Towards an Information Privacy and Personal Data Protection Competency Model for CitizensAggeliki Tsohou. 112-125 [doi]
- A Category-Based Framework for Privacy-Aware Collaborative Access ControlDenis Obrezkov, Karsten Sohr, Rainer Malaka. 126-139 [doi]
- Car Drivers' Privacy Concerns and Trust PerceptionsGiampaolo Bella, Pietro Biondi, Giuseppe Tudisco. 143-154 [doi]
- AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor AuthenticationDavy Preuveneers, Sander Joos, Wouter Joosen. 155-170 [doi]