| 2013 | A multi-tenant RBAC model for collaborative cloud services. Bo Tang, Qi Li, Ravi S. Sandhu |
| 2013 | A novel privacy preserving keyword searching for cloud storage. Lin Cheng, Zhengping Jin, Qiaoyan Wen, Hua Zhang |
| 2013 | A peer-to-peer agent community for digital oblivion in online social networks. Klara Stokes, Niklas Carlsson |
| 2013 | A provenance-based access control model for dynamic separation of duties. Dang Nguyen, Jaehong Park, Ravi S. Sandhu |
| 2013 | A self-adaptive classification for the dissociating privacy agent. Marc Juárez, Vicenç Torra |
| 2013 | Aegis: A semantic implementation of privacy as contextual integrity in social ecosystems. Md. Imrul Kayes, Adriana Iamnitchi |
| 2013 | Allowing privacy-preserving analysis of social network likes. Francesco Buccafurri, Lidia Fotia, Gianluca Lax |
| 2013 | An NFC based consumer-level counterfeit detection framework. Muhammad Qasim Saeed, Zeeshan Bilal, Colin D. Walter |
| 2013 | An efficient and provably-secure coercion-resistant e-voting protocol. Alireza Toroghi Haghighat, Mohammad Sadeq Dousti, Rasool Jalili |
| 2013 | An implementation of secure multi-party computations to preserve privacy when processing EMR data. Anders Andersen |
| 2013 | Blend me in: Privacy-preserving input generalization for personalized online services. Alegria Baquero, Allan M. Schiffman, Jeff Shrager |
| 2013 | Coalitional games for the management of anonymous access in online social networks. Esther Palomar, Almudena Alcaide, Elisenda Molina, Yan Zhang |
| 2013 | Communicating trustworthiness using radar graphs: A detailed look. Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts |
| 2013 | Contextual feature based one-class classifier approach for detecting video response spam on YouTube. Vidushi Chaudhary, Ashish Sureka |
| 2013 | Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective. Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere |
| 2013 | Design and implementation of multi-user secure indices for encrypted cloud storage. Mao-Pang Pang Lin, Wei-Chih Hong, Chih-Hung Chen, Chen-Mou Cheng |
| 2013 | Device Comfort for mobile health information accessibility. Stephen Marsh, Yao Wang, Sylvie Noël, Lewis Robart, John A. Stewart |
| 2013 | Differential privacy via t-closeness in data publishing. Jordi Soria-Comas, Josep Domingo-Ferrer |
| 2013 | Efficient polynomial delegation under standard assumptions. Paz Morillo, Marc Obrador |
| 2013 | Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013 Jordi Castellà-Roca, Josep Domingo-Ferrer, Joaquín García-Alfaro, Ali A. Ghorbani, Christian Damsgaard Jensen, Jesús A. Manjón, Iosif-Viorel Onut, Natalia Stakhanova, Vicenç Torra, Jie Zhang |
| 2013 | Encouraging second thoughts: Obstructive user interfaces for raising security awareness. Tim Storer, Stephen Marsh, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs, Karen Renaud, Mehmet Vefa Bicakci |
| 2013 | Error-rate-based fusion of biometric experts. Mads I. Ingwar, Naveed Ahmed, Christian Damsgaard Jensen |
| 2013 | Extended structural balance theory for modeling trust in social networks. Yi Qian, Sibel Adali |
| 2013 | HALT: Hybrid anonymization of longitudinal transactions. Morvarid Sehatkar, Stan Matwin |
| 2013 | Hot-patching a web server: A case study of ASAP code repair. Mathias Payer, Thomas R. Gross |
| 2013 | How people care about their personal data released on social media. Kellyton dos Santos Brito, Frederico Araújo Durão, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira |
| 2013 | Identifying individual vulnerability based on public data. John Ferro, Lisa Singh, Micah Sherr |
| 2013 | Improving security of virtual machines during live migrations. Sebastian Biedermann, Martin Zittel, Stefan Katzenbeisser |
| 2013 | Key privacy and anonymous protocols. Paolo D'Arco, Alfredo De Santis |
| 2013 | Leveraging platoon dispersion for Sybil detection in vehicular networks. Muhammad Al Mutaz, Levi Malott, Sriram Chellappan |
| 2013 | Model-based specification and refinement of usage control policies. Ricardo Neisse, Jörg Dörr |
| 2013 | Multi-data-types interval decision diagrams for XACML evaluation engine. Canh Ngo, Marc X. Makkes, Yuri Demchenko, Cees de Laat |
| 2013 | Policy templates for relationship-based access control. Evangelos Aktoudianakis, Jason Crampton, Steve A. Schneider, Helen Treharne, Adrian Waller |
| 2013 | Privacy-preserving social recommendations in geosocial networks. Bisheng Liu, Urs Hengartner |
| 2013 | Providing useful and private Web search by means of social network profiling. Alexandre Viejo, David Sánchez |
| 2013 | Pseudonymous communications in secure industrial wireless sensor networks. Nouha Oualha, Alexis Olivereau, Aymen Boudguiga |
| 2013 | Real-time malicious fast-flux detection using DNS and bot related features. Sergi Martinez-Bea, Sergio Castillo-Perez, Joaquín García-Alfaro |
| 2013 | SPIKE: A novel session key management protocol with time-varying secure cluster formation in wireless sensor networks. Sutirtha Sanyal |
| 2013 | SSAS: A simple secure addressing scheme for IPv6 autoconfiguration. Hosnieh Rafiee, Christoph Meinel |
| 2013 | Secure rendering process in cloud computing. Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, Madjid Merabti |
| 2013 | Selective cloaking: Need-to-know for location-based apps. Benjamin Henne, Christian Kater, Matthew Smith, Michael Brenner |
| 2013 | Semi-automated assessment of annotation trustworthiness. Davide Ceolin, Archana Nottamkandath, Wan J. Fokkink |
| 2013 | Socio-technical formal analysis of TLS certificate validation in modern browsers. Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini |
| 2013 | Targeted attacks detection with SPuNge. Marco Balduzzi, Vincenzo Ciangaglini, Robert McArdle |
| 2013 | The role of phone numbers in understanding cyber-crime schemes. Andrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurélien Francillon, Davide Balzarotti |
| 2013 | Top-down itemset recoding for releasing private complex data. Tsubasa Takahashi, Koji Sobataka, Takao Takenouchi, Yuki Toyoda, Takuya Mori, Takahide Kohro |
| 2013 | Towards engineering trust systems: Template-based, component-oriented assembly. Sarah Magin, Sascha Hauke |
| 2013 | Traceability analysis of quadratic residue-based RFID authentication protocols. Zahra Sohrabi-Bonab, Mahdi R. Alagheband, Mohammad Reza Aref |
| 2013 | Trust-based decision-making for the adaptation of public displays in changing social contexts. Ekaterina Kurdjokova, Michael Wißner, Stephan Hammer, Elisabeth André |
| 2013 | TrustForge: Flexible access control for collaborative crowd-sourced environment. Jian Chang, Peter Gebhard, Andreas Haeberlen, Zachary G. Ives, Insup Lee, Oleg Sokolsky, Krishna K. Venkatasubramanian |
| 2013 | Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet. Markus Gruber, Christian Schanes, Florian Fankhauser, Thomas Grechenig |
| 2013 | Writing down your password: Does it help? Vanessa Boothroyd, Sonia Chiasson |