G. Michael, V. Solomon, L. Sunderam, M. Xiong, and .. Li-privacy, Preserving Elastic Net for Data Encrypted by Different Keys -With an Application on Biomarker Discovery, p.185

T. Georgiou and .. , Amr El Abbadi, and Xifeng Yan Privacy-Preserving Outlier Detection for Data Streams, p.225

T. Vishwas, R. K. Patil, and .. , Shyamasundar Cloud Security Towards Actionable Mission Impact Assessment in the Context of Cloud Computing, 259 Xiaoyan Sun, Anoop Singhal, and Peng Liu Reducing Security Risks of Clouds Through Virtual Machine Placement, p.275

J. Han, W. Zang, S. Chen, M. Yu-firewall-policies-provisioning-through, and .. Sdn-in-the-cloud, 293 Nora Cuppens Philippe Le Parc, and Frédéric Cuppens Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations, p.311

. Tushar-kanti-saha and T. Mayank, Koshiba Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems, p.349

A. L. Ferrara, A. Squicciarini, C. Liao, and L. Truc, Nguyen Secure Storage in the Cloud High-Speed High-Security Public Key Encryption with Keyword Search, 365 Rouzbeh Behnia

B. Fuhry, R. Bahmani, F. Brasser, F. Hahn, F. Kerschbaum et al., XII Contents A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction, 409 Sebastian Messmer, Jochen Rill, Dirk Achenbach, and Jörn Müller-Quade Secure Systems Keylogger Detection Using a Decoy Keyboard . . . . . . . . . . . . . . . . . . . . . . 433

H. Xue, F. Li, and .. , Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options, p.509

N. Mosharraf and P. Anura, Jayasumana, and Indrakshi Ray Securing Web Applications with Predicate Access Control, p.541