Streams, Security and Scalabilit
Towards Privacy-Enhanced Authorization Policies and Languages
Revocation of Obligation and Authorisation Policy Objects
Role Slices: A Notation for RBAC Permission Assignment and Enforcement
Designing Secure Indexes for Encrypted Databases
Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases
Verified Query Results from Hybrid Authentication Trees
Multilevel Secure Teleconferencing over Public Switched Telephone Network
Secrecy of Two-Party Secure Computation
Reliable Scheduling of Advanced Transactions
Privacy-Preserving Decision Trees over Vertically Partitioned Data
Privacy-Preserving Collaborative Association Rule Mining
Privacy-Preserving Distributed k-Anonymity
Towards Database Firewalls
Complete Redundancy Detection in Firewalls
A Comprehensive Approach to Anomaly Detection in Relational Databases
An Authorization Architecture for Web Services
Secure Model Management Operations for the Web
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions
Secure Mediation with Mobile Code
Security Vulnerabilities in Software Systems: A Quantitative Perspect
Trading Off Security in a Service Oriented Architecture
Trusted Identity and Session Management Using Secure Cookies
Security Issues in Querying Encrypted Data
Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption
Author Index