Risk-Aware Role-Based Access Control |
Liang Chen and Jason Crampton. |
New Modalities for Access Control Logics:
Permission, Control and Ratification |
Valerio Genovese and Deepak Garg |
A Proof-Carrying File System with Revocable
and Use-Once Certificates |
Jamie Morgenstern, Deepak Garg and Frank Pfenning |
Location Privacy in Relation
with Trusted Peers |
Klaus Rechert and Benjamin
Greschbach |
Secure architecure for the
integration of RFID and sensors in personal area networks |
Pablo Najera, Rodrigo Roman and
Javier Lopez |
Hiding the Policy in
Cryptographic Access Control |
Sascha Müller and Stefan
Katzenbeisser |
The Fairness Requirement for
Non-repudiation Protocols |
Wojciech Jamroga, Sjouke Mauw
and Matthijs Melissen |
The Role of Data Integrity in EU
Digital Signature Legislation - Achieving Statutory Trust for
Sanitizable Signature Schemes |
Henrich Christopher Pöhls and Focke Höhne. |
Mutual Remote Attestation:
Enabling System Cloning for TPM based Platforms |
Benjamin Justus, Ulrich Greveler and Dennis Löhr |
Accepting Information with
a Pinch of Salt: Handling Untrusted Information Sources |
Sadie Creese, Michael Goldsmith and Syed Sadiqur Rahman |
Security Notions of Biometric
Remote Authentication Revisited |
Neyire Deniz Sarier |
Automated Analysis of Infinite
State Workflows with Access Control Policies |
Alessandro Armando and Silvio Ranise |