| 2012 | 3rd edition of the workshop on trustworthy self-organizing systems (TSOS 2012). Christian Müller-Schloer, Wolfgang Reif, Jan-Philipp Steghöfer |
| 2012 | A concordance framework for building trust evidences. Anirban Basu, Natasha Dwyer, Stephen Naicken |
| 2012 | A distributed platform of high interaction honeypots and experimental results. Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata |
| 2012 | A provenance-based access control model. Jaehong Park, Dang Nguyen, Ravi S. Sandhu |
| 2012 | A secure data deduplication framework for cloud environments. Fatema Rashid, Ali Miri, Isaac Woungang |
| 2012 | Advice and trust in games of choice. Cody Buntain, Jennifer Golbeck, Dana S. Nau, Sarit Kraus |
| 2012 | Aggregation and privacy in multi-relational databases. Yasser Jafer, Herna L. Viktor, Eric Paquet |
| 2012 | An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast. Gianpiero Costantino, Fabio Martinelli, Paolo Santi, Dario Amoruso |
| 2012 | An integrated key management and secure routing framework for Mobile Ad-Hoc Networks. Shushan Zhao, Robert D. Kent, Akshai K. Aggarwal |
| 2012 | Automated detection of session management vulnerabilities in web applications. Yusuke Takamatsu, Yuji Kosuga, Kenji Kono |
| 2012 | Building robust Reputation Systems for travel-related services. Huiying Duan, Peng Yang |
| 2012 | CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks. Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab |
| 2012 | Collaborative trust evaluation for wiki security. Kasper Lindberg, Christian Damsgaard Jensen |
| 2012 | Combining the setbase approach with negative databases. Julien Bringer, Hervé Chabanne, Olivier Cipiere |
| 2012 | DLAS: Data Location Assurance Service for cloud computing environments. Ali Nur Mohammad Noman, Carlisle M. Adams |
| 2012 | Distributive and retributive justice in self-organising electronic institutions. Jeremy Pitt |
| 2012 | Ethical and legal considerations of reCAPTCHA. Jonathan Lung |
| 2012 | Exploring re-identification risks in public domains. Aditi Ramachandran, Lisa Singh, Edward Porter, Frank Nagle |
| 2012 | Limiting data collection in application forms: A real-case application of a founding privacy principle. Nicolas Anciaux, Benjamin Nguyen, Michalis Vazirgiannis |
| 2012 | Making trusted attribute assertions online with the publish trust framework. Jennifer Golbeck, Hal Warren, Eva Winer |
| 2012 | Obligations in risk-aware access control. Liang Chen, Jason Crampton, Martin J. Kollingbaum, Timothy J. Norman |
| 2012 | Out of sight, out of mind: Effects of displaying access-control information near the item it controls. Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter |
| 2012 | PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents. Florian Schmitt, Jan Gassen, Elmar Gerhards-Padilla |
| 2012 | Platform for privacy preferences (P3P): Current status and future directions. Muyiwa Olurin, Carlisle Adams, Luigi Logrippo |
| 2012 | Privacy invasion in business environments. Manuel Lafond, Pierre-Olivier Brosseau, Esma Aïmeur |
| 2012 | Privacy-preserving resource evaluation in social networks. Francesco Buccafurri, Lidia Fotia, Gianluca Lax |
| 2012 | REM: A runtime browser extension manager with fine-grained access control. Said Marouf, Mohamed Shehab, Adharsh Desikan |
| 2012 | Risk perception of internet-related activities. Daniel Leblanc, Robert Biddle |
| 2012 | SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0). Arun Prakash, Kumara Krishnan, Bon K. Sy |
| 2012 | Secure collaboration in on boarding companies. Pratap Chillakanti |
| 2012 | Service provider authentication assurance. Audun Jøsang, Kent A. Varmedal, Christophe Rosenberger, Rajendra Kumar |
| 2012 | Single-party private web search. Alexandre Viejo, Jordi Castellà-Roca, Oriol Bernado, Josep Maria Mateo-Sanz |
| 2012 | Social secret sharing in cloud computing using a new trust function. Mehrdad Nojoumian, Douglas R. Stinson |
| 2012 | Sticky policies for data control in the cloud. Slim Trabelsi, Jakub Sendor |
| 2012 | Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012 Nora Cuppens-Boulahia, Philip Fong, Joaquín García-Alfaro, Stephen Marsh, Jan-Philipp Steghöfer |
| 2012 | The role of trust in computer security. |
| 2012 | The theory of creating trust with a set of mistrust-parties. Johannes Viehmann |
| 2012 | Towards a BPEL model-driven approach for Web services security. Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok |
| 2012 | Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions. Marian Harbach, Sascha Fahl, Michael Brenner, Thomas Muders, Matthew Smith |
| 2012 | Towards requirements for trust management. Mark Vinkovits |
| 2012 | Using Trust to reduce wasteful computation in open Desktop Grid Systems. Lukas Klejnowski, Yvonne Bernard, Christian Müller-Schloer, Jörg Hähner |
| 2012 | Using conventional reasoning techniques for self-organising systems. Graeme Smith, Jeff W. Sanders |
| 2012 | Visualization of processes in self-learning systems. Gabriele Peters, Kerstin Bunte, Marc Strickert, Michael Biehl, Thomas Villmann |
| 2012 | WhACKY! - What anyone could know about you from Twitter. Denzil Correa, Ashish Sureka, Raghav Sethi |