C. Ferreira, T. , and R. Trujillo, Rasua Security and Privacy in Databases Guaranteeing Correctness of Bulk Operations in Outsourced Databases, p.37

I. Lazrig, T. Ong-metrics, and .. , Indrajit Ray, Indrakshi Ray, and Michael Kahn Access Control Mining Hierarchical Temporal Roles with Multiple, p.79

D. Scott, T. Stoller, and .. Bui-inter-rebac, Inter-operation of Relationship-Based Access Control Model Instances, p.96

J. Crampton, J. Sellwood-role-centric-circle-of-trust-in-multi-tenant-cloud-iaas, and .. , 106 Navid Pustchi and Ravi Sandhu A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models, 122 Prosunjit Biswas

S. Dolev, Y. Li, S. Sharma, and .. , Creating Believable Decoy Project Folders for Detecting Data Theft, p.161

S. Thaler, Jerry den Hartog, and Milan Petkovic Practical Differentially Private Modeling of Human Movement Data, p.170

R. Mahmudlu and .. , Jerry den Hartog, and Nicola Zannone Sharing-Habits Based Privacy Control in Social Networks, p.217

S. Levy, E. Gudes, and .. , and Nurit Gal-Oz Counteracting Active Attacks in Social Network Graphs, p.233

S. Mauw, R. Trujillo-rasua, and B. , Xuan Reasoning about Security and Its Cost Formalizing Threat Models for Virtualized Systems, p.251

D. Sgandurra and E. Karafili, and Emil Lupu Reasoning About Firewall Policies Through Refinement and Composition, p.268

E. Pattuk, M. Kantarcioglu, and .. , Huseyin Ulusoy, and Bradley Malin Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks, p.295

D. Borbor, L. Wang, and .. , Sushil Jajodia, and Anoop Singhal Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems, p.313

J. Bringer and H. Chabanne, Daniel Le Métayer, and Roch Lescuyer X Contents Trust and Zero-Day Vulnerabilities Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services, p.331