| 2013 | A Model for Trust-Based Access Control and Delegation in Mobile Clouds. Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han |
| 2013 | Access Control and Query Verification for Untrusted Databases. Rohit Jain, Sunil Prabhakar |
| 2013 | An Approach to Select Cost-Effective Risk Countermeasures. Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen |
| 2013 | Analysis of TRBAC with Dynamic Temporal Role Hierarchies. Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural |
| 2013 | Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection. Hiroaki Kikuchi, Jun Sakuma |
| 2013 | Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings Lingyu Wang, Basit Shafiq |
| 2013 | Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret? Joachim Biskup, Marcel Preuß |
| 2013 | Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring. Liyue Fan, Li Xiong, Vaidy S. Sunderam |
| 2013 | Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase. Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere |
| 2013 | Extending Loose Associations to Multiple Fragments. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati |
| 2013 | Fair Private Set Intersection with a Semi-trusted Arbiter. Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello |
| 2013 | Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations. Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France |
| 2013 | Optimal Re-encryption Strategy for Joins in Encrypted Databases. Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert |
| 2013 | Policy Analysis for Administrative Role Based Access Control without Separate Administration. Ping Yang, Mikhail I. Gofman, Zijiang Yang |
| 2013 | Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases. Attila Altay Yavuz |
| 2013 | Quantitative Security Risk Assessment of Android Permissions and Applications. Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala |
| 2013 | Result Integrity Verification of Outsourced Frequent Itemset Mining. Boxiang Dong, Ruilin Liu, Wendy Hui Wang |
| 2013 | Rule Enforcement with Third Parties in Secure Cooperative Data Access. Meixing Le, Krishna Kant, Sushil Jajodia |
| 2013 | TerraCheck: Verification of Dedicated Cloud Storage. Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing |
| 2013 | Toward Mining of Temporal Roles. Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
| 2013 | Towards User-Oriented RBAC Model. Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar |
| 2013 | Unlinkable Content Playbacks in a Multiparty DRM System. Ronald Petrlic, Stephan Sekula |
| 2013 | Using Safety Constraint for Transactional Dataset Anonymization. Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi |