| 2014 | 'Who, When, and Where?' Location Proof Assertion for Mobile Devices. Rasib Khan, Shams Zawoad, Md Munirul Haque, Ragib Hasan |
| 2014 | A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters. Vikas G. Ashok, Ravi Mukkamala |
| 2014 | Attribute-Aware Relationship-Based Access Control for Online Social Networks. Yuan Cheng, Jaehong Park, Ravi S. Sandhu |
| 2014 | Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang |
| 2014 | Consistent Query Plan Generation in Secure Cooperative Data Access. Meixing Le, Krishna Kant, Sushil Jajodia |
| 2014 | Data Leakage Quantification. Sokratis Vavilis, Milan Petkovic, Nicola Zannone |
| 2014 | Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings Vijay Atluri, Günther Pernul |
| 2014 | Design Patterns for Multiple Stakeholders in Social Computing. Pooya Mehregan, Philip W. L. Fong |
| 2014 | Dynamic Workflow Adjustment with Security Constraints. Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang, Lian Duan |
| 2014 | ELITE: zEro Links Identity managemenT systEm. Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray |
| 2014 | Efficient and Enhanced Solutions for Content Sharing in DRM Systems. Michal Davidson, Ehud Gudes, Tamir Tassa |
| 2014 | FSquaDRA: Fast Detection of Repackaged Applications. Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser |
| 2014 | Hunting the Unknown - White-Box Database Leakage Detection. Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy |
| 2014 | Incremental Analysis of Evolving Administrative Role Based Access Control Policies. Silvio Ranise, Anh Tuan Truong |
| 2014 | Integrity Assurance for Outsourced Databases without DBMS Modification. Wei Wei, Ting Yu |
| 2014 | LPM: Layered Policy Management for Software-Defined Networks. Wonkyu Han, Hongxin Hu, Gail-Joon Ahn |
| 2014 | Mining Attribute-Based Access Control Policies from Logs. Zhongyuan Xu, Scott D. Stoller |
| 2014 | On Minimizing the Size of Encrypted Databases. Giovanni Di Crescenzo, David Shallcross |
| 2014 | Optimizing Integrity Checks for Join Queries in the Cloud. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
| 2014 | Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database. Giovanni Di Crescenzo, Debra L. Cook, Allen McIntosh, Euthimios Panagos |
| 2014 | Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials. David Derler, Christian Hanser, Daniel Slamanig |
| 2014 | Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray |
| 2014 | Randomly Partitioned Encryption for Cloud Databases. Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, Ramarathnam Venkatesan |
| 2014 | Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud. Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi |
| 2014 | Specification and Deployment of Integrated Security Policies for Outsourced Data. Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard |
| 2014 | Toward Software Diversity in Heterogeneous Networked Systems. Chu Huang, Sencun Zhu, Robert F. Erbacher |
| 2014 | Towards Secure Cloud Database with Fine-Grained Access Control. Michael G. Solomon, Vaidy S. Sunderam, Li Xiong |