Table of Contents:
  • Streams, Security and Scalability
  • Towards Privacy-Enhanced Authorization Policies and Languages
  • Revocation of Obligation and Authorisation Policy Objects
  • Role Slices: A Notation for RBAC Permission Assignment and Enforcement
  • Designing Secure Indexes for Encrypted Databases
  • Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases
  • Verified Query Results from Hybrid Authentication Trees
  • Multilevel Secure Teleconferencing over Public Switched Telephone Network
  • Secrecy of Two-Party Secure Computation
  • Reliable Scheduling of Advanced Transactions
  • Privacy-Preserving Decision Trees over Vertically Partitioned Data
  • Privacy-Preserving Collaborative Association Rule Mining
  • Privacy-Preserving Distributed k-Anonymity
  • Towards Database Firewalls
  • Complete Redundancy Detection in Firewalls
  • A Comprehensive Approach to Anomaly Detection in Relational Databases
  • An Authorization Architecture for Web Services
  • Secure Model Management Operations for the Web
  • A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions
  • Secure Mediation with Mobile Code
  • Security Vulnerabilities in Software Systems: A Quantitative Perspective
  • Trading Off Security in a Service Oriented Architecture
  • Trusted Identity and Session Management Using Secure Cookies
  • Security Issues in Querying Encrypted Data
  • Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.