| 2015 | A Topology Based Flow Model for Computing Domain Reputation. Igor Mishsky, Nurit Gal-Oz, Ehud Gudes |
| 2015 | An Administrative Model for Relationship-Based Access Control. Scott D. Stoller |
| 2015 | Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios. Daniel Ricardo dos Santos, Silvio Ranise, Luca Compagna, Serena Elisa Ponta |
| 2015 | Automated Translation of End User Policies for Usage Control Enforcement. Prachi Kumari, Alexander Pretschner |
| 2015 | Constructing Inference-Proof Belief Mediators. Joachim Biskup, Cornelia Tadros |
| 2015 | Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings Pierangela Samarati |
| 2015 | Defensive Resource Allocations with Security Chokepoints in IPv6 Networks. Assane Gueye, Peter Mell, Richard E. Harang, Richard J. La |
| 2015 | Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis. Euijin Choo, Ting Yu, Min Chi |
| 2015 | Expiration and Revocation of Keys for Attribute-Based Signatures. Stephen R. Tate, Roopa Vishwanathan |
| 2015 | FPGuard: Detection and Prevention of Browser Fingerprinting. Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam |
| 2015 | FamilyID: A Hybrid Approach to Identify Family Information from Microblogs. Jamuna Gopal, Shu Huang, Bo Luo |
| 2015 | Inference Leakage Detection for Authorization Policies over RDF Data. Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid |
| 2015 | Integrating Attributes into Role-Based Access Control. Qasim Mahmood Rajpoot, Christian Damsgaard Jensen, Ram Krishnan |
| 2015 | MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce. Neelam Memon, Jianhua Shao |
| 2015 | Migrating from DAC to RBAC. Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural |
| 2015 | Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies. Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones |
| 2015 | Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid. Hu Chun, Kui Ren, Wei Jiang |
| 2015 | Personalized Composition of Trustful Reputation Systems. Johannes Sänger, Christian Richthammer, André Kremser, Günther Pernul |
| 2015 | Privacy Preserving Record Matching Using Automated Semi-trusted Broker. Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia |
| 2015 | Privacy-Preserving Public Transport Ticketing System. Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker |
| 2015 | Privacy-Preserving Range Queries from Keyword Queries. Giovanni Di Crescenzo, Abhrajit Ghosh |
| 2015 | Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System. Annanda Thavymony Rath, Jean-Noël Colin |
| 2015 | Sanitization of Call Detail Records via Differentially-Private Bloom Filters. Mohammad Alaggan, Sébastien Gambs, Stan Matwin, Mohammed Tuhin |
| 2015 | Stream Processing with Secure Information Flow Constraints. Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose F. Gamble |
| 2015 | Towards Collaborative Query Planning in Multi-party Database Networks. Mingyi Zhao, Peng Liu, Jorge Lobo |