| 2016 | A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models. Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan |
| 2016 | A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data. Fahad Shaon, Murat Kantarcioglu |
| 2016 | Access Control for the Shuffle Index. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
| 2016 | CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud. Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy, Bradley A. Malin |
| 2016 | Counteracting Active Attacks in Social Network Graphs. Sjouke Mauw, Rolando Trujillo-Rasua, Bochuan Xuan |
| 2016 | Data Governance and Transparency for Collaborative Systems. Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone |
| 2016 | Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings Silvio Ranise, Vipin Swarup |
| 2016 | Deciphering Text from Touchscreen Key Taps. Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
| 2016 | Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal |
| 2016 | Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols. Giovanni Di Crescenzo, Euthimios Panagos, Brian A. Coan |
| 2016 | Formalizing Threat Models for Virtualized Systems. Daniele Sgandurra, Erisa Karafili, Emil Lupu |
| 2016 | Guaranteeing Correctness of Bulk Operations in Outsourced Databases. Luca Ferretti, Michele Colajanni, Mirco Marchetti |
| 2016 | Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances. Jason Crampton, James Sellwood |
| 2016 | Mining Hierarchical Temporal Roles with Multiple Metrics. Scott D. Stoller, Thang Bui |
| 2016 | Practical Differentially Private Modeling of Human Movement Data. Harichandan Roy, Murat Kantarcioglu, Latanya Sweeney |
| 2016 | Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes. Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn |
| 2016 | Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract). Shlomi Dolev, Yin Li, Shantanu Sharma |
| 2016 | Reasoning About Firewall Policies Through Refinement and Composition. Ultan Neville, Simon N. Foley |
| 2016 | Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems. Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer |
| 2016 | Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS. Navid Pustchi, Ravi S. Sandhu |
| 2016 | Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems. Olgierd Pieczul, Simon N. Foley |
| 2016 | Sharing-Habits Based Privacy Control in Social Networks. Silvie Levy, Ehud Gudes, Nurit Gal-Oz |
| 2016 | The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem. Christof Ferreira Torres, Rolando Trujillo-Rasua |
| 2016 | Towards Creating Believable Decoy Project Folders for Detecting Data Theft. Stefan Thaler, Jerry den Hartog, Milan Petkovic |
| 2016 | Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services. Georg Merzdovnik, Klaus Falb, Martin Schmiedecker, Artemios G. Voyiatzis, Edgar R. Weippl |