Rasua Security and Privacy in Databases Guaranteeing Correctness of Bulk Operations in Outsourced Databases, p.37 ,
Indrajit Ray, Indrakshi Ray, and Michael Kahn Access Control Mining Hierarchical Temporal Roles with Multiple, p.79 ,
Inter-operation of Relationship-Based Access Control Model Instances, p.96 ,
106 Navid Pustchi and Ravi Sandhu A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models, 122 Prosunjit Biswas ,
Creating Believable Decoy Project Folders for Detecting Data Theft, p.161 ,
Jerry den Hartog, and Milan Petkovic Practical Differentially Private Modeling of Human Movement Data, p.170 ,
Jerry den Hartog, and Nicola Zannone Sharing-Habits Based Privacy Control in Social Networks, p.217 ,
and Nurit Gal-Oz Counteracting Active Attacks in Social Network Graphs, p.233 ,
Xuan Reasoning about Security and Its Cost Formalizing Threat Models for Virtualized Systems, p.251 ,
and Emil Lupu Reasoning About Firewall Policies Through Refinement and Composition, p.268 ,
Huseyin Ulusoy, and Bradley Malin Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks, p.295 ,
Sushil Jajodia, and Anoop Singhal Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems, p.313 ,
Daniel Le Métayer, and Roch Lescuyer X Contents Trust and Zero-Day Vulnerabilities Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services, p.331 ,