Double-authentication-preventing signatures Bertram PoetteringDouglas Stebila Regular Contribution 12 December 2015 Pages: 1 - 22
Write-only oblivious RAM-based privacy-preserved access of outsourced data Lichun LiAnwitaman Datta Regular Contribution 15 April 2016 Pages: 23 - 42
A formal modeling and analysis approach for access control rules, policies, and their combinations Vahid R. KarimiPaulo S. C. AlencarDonald D. Cowan Regular Contribution 27 January 2016 Pages: 43 - 74
An extended access control mechanism exploiting data dependencies Davide Alberto AlbertiniBarbara CarminatiElena Ferrari Regular Contribution 27 February 2016 Pages: 75 - 89
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets Riaz Ahmed ShaikhKamel AdiLuigi Logrippo Regular Contribution 30 January 2016 Pages: 91 - 113