Pucacco Policy Definition and Enforcement Mining Likely Properties of Access Control Policies via Association Rule Mining ,
Chapin Trust and Identity Management Using Trust-Based Information Aggregation for Predicting Security Level of Systems, p.241 ,
Indrakshi Ray, and Indrajit Ray Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms, p.257 ,
and Heiko Roßnagel Short Papers An Access Control Model for Web Databases, p.287 ,
Adel Bouhoula, and Faten Labbene-Ayachi Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems, 295 Hasan Qunoo and Mark Ryan Evaluating the Risk of Adopting RBAC Roles . . . . . . . . . . . . . . . . . . . . . . . 303 ,
Alberto Ocello, and Nino Vincenzo Verde Table of Contents XIII Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of, p.311 ,
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach, p.335 ,
Bao Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols, p.358 ,