| 2012 | A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard. Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet |
| 2012 | A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. Xin Jin, Ram Krishnan, Ravi S. Sandhu |
| 2012 | A User-to-User Relationship-Based Access Control Model for Online Social Networks. Yuan Cheng, Jaehong Park, Ravi S. Sandhu |
| 2012 | Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data. Robert Nix, Murat Kantarcioglu, Keesook J. Han |
| 2012 | Automated and Efficient Analysis of Role-Based Access Control with Attributes. Alessandro Armando, Silvio Ranise |
| 2012 | Code Type Revealing Using Experiments Framework. Rami Sharon, Ehud Gudes |
| 2012 | Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro |
| 2012 | Decentralized Semantic Threat Graphs. Simon N. Foley, William M. Fitzgerald |
| 2012 | Distributed Data Federation without Disclosure of User Existence. Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga |
| 2012 | Enforcing Subscription-Based Authorization Policies in Cloud Scenarios. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga |
| 2012 | From MDM to DB2: A Case Study of Security Enforcement Migration. Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run |
| 2012 | Improving Virtualization Security by Splitting Hypervisor into Smaller Components. Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing |
| 2012 | Layered Security Architecture for Masquerade Attack Detection. Hamed Saljooghinejad, Wilson Naik Bhukya |
| 2012 | Logics for Security and Privacy. Leendert W. N. van der Torre |
| 2012 | Privacy Consensus in Anonymization Systems via Game Theory. Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini |
| 2012 | Privacy-Preserving Subgraph Discovery. Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri |
| 2012 | Randomizing Smartphone Malware Profiles against Statistical Mining Techniques. Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani Thuraisingham |
| 2012 | Reconstruction Attack through Classifier Analysis. Sébastien Gambs, Ahmed Gmati, Michel Hurfin |
| 2012 | Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards. Ding Wang, Chunguang Ma, Peng Wu |
| 2012 | Security Limitations of Using Secret Sharing for Data Outsourcing. Jonathan L. Dautrich Jr., Chinya V. Ravishankar |
| 2012 | Security Vulnerabilities of User Authentication Scheme Using Smart Card. Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi |
| 2012 | Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies. Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann |
| 2012 | Uniform Obfuscation for Location Privacy. Gianluca Dini, Pericle Perazzo |
| 2012 | XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks. Smitha Sundareswaran, Anna Cinzia Squicciarini |
| 2012 | k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing. Abbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili |