| 2010 | A Call Conference Room Interception Attack and Its Detection. Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis |
| 2010 | A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression. Javier Parra-Arnau, David Rebollo-Monedero, Jordi Forné |
| 2010 | An Agent Based Back-End RFID Tag Management System. Evangelos Rekleitis, Panagiotis Rizomiliotis, Stefanos Gritzalis |
| 2010 | An Insider Threat Prediction Model. Miltiadis Kandias, Alexios Mylonas, Nikos Virvilis, Marianthi Theoharidou, Dimitris Gritzalis |
| 2010 | Analyzing Information Security Awareness through Networks of Association. Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis |
| 2010 | Assessing the Usability of End-User Security Software. Tarik Ibrahim, Steven Furnell, Maria Papadaki, Nathan L. Clarke |
| 2010 | Attacking Image Recognition Captchas - A Naive but Effective Approach. Christoph Fritsch, Michael Netter, Andreas Reisser, Günther Pernul |
| 2010 | Building ISMS through the Reuse of Knowledge. Luis Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernández-Medina, Mario Piattini |
| 2010 | Context-Aware Privacy Design Pattern Selection. Siani Pearson, Yun Shen |
| 2010 | Efficiency Improvement of Homomorphic E-Auction. Kun Peng, Feng Bao |
| 2010 | Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation. Gina Kounga, Marco Casassa Mont, Pete Bramhall |
| 2010 | Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol. Almudena Alcaide, Esther Palomar, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda |
| 2010 | In Search of Search Privacy. Wesley Brandi, Martin S. Olivier |
| 2010 | Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness. Soude Fazeli, Alireza Zarghami, Nima Dokoohaki, Mihhail Matskin |
| 2010 | Privacy Policy Referencing. Audun Jøsang, Lothar Fritsch, Tobias Mahler |
| 2010 | Private Searching on MapReduce. Huafei Zhu, Feng Bao |
| 2010 | Real-Time Remote Attestation with Privacy Protection. Aimin Yu, Dengguo Feng |
| 2010 | Safe and Efficient Strategies for Updating Firewall Policies. Zeeshan Ahmed, Abdessamad Imine, Michaël Rusinowitch |
| 2010 | Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. Christoph Fritsch, Günther Pernul |
| 2010 | Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings Sokratis K. Katsikas, Javier López, Miguel Soriano |
| 2010 | Untraceability and Profiling Are Not Mutually Exclusive. Sébastien Canard, Amandine Jambert |
| 2010 | Usage Control, Risk and Trust. Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Artsiom Yautsiukhin |