| 2012 | A Conceptual Framework for Trust Models. Francisco Moyano, M. Carmen Fernández Gago, Javier López |
| 2012 | A Prototype for Enforcing Usage Control Policies Based on XACML. Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori |
| 2012 | A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities. Bastian Braun, Stefan Kucher, Martin Johns, Joachim Posegga |
| 2012 | Access Control Configuration for J2EE Web Applications: A Formal Perspective. Matteo Maria Casalino, Romuald Thion, Mohand-Said Hacid |
| 2012 | Advances and Challenges in Standalone Host-Based Intrusion Detection Systems. Vit Bukac, Pavel Tucek, Martin Deutsch |
| 2012 | An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control. Michael Netter, Sabri Hassan, Günther Pernul |
| 2012 | Aniketos: Challenges and Results. Miguel Ponce de Leon, Richard Sanders, Per Håkon Meland, Marina Egea, Zeta Dooly |
| 2012 | Attribute-Based Credentials for Trust (ABC4Trust). Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg |
| 2012 | Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract). Markus Wehner, Sven Zeisberg, Nouha Oualha, Alexis Olivereau, Mike Ludwig, Dan Tudose, Laura Gheorghe, Emil Slusanschi, Basil Hess, Felix von Reischach, David Bateman |
| 2012 | Challenges for Advanced Security Monitoring - The MASSIF Project. Roland Rieke, Elsa Prieto, Rodrigo Diaz, Hervé Debar, Andrew Hutchison |
| 2012 | Cloud Separation: Stuck Inside the Cloud. Waldo Delport, Martin S. Olivier |
| 2012 | Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches. Giuseppe D'Acquisto, Marta Flamini, Maurizio Naldi |
| 2012 | Decentralized, Cooperative, Secure and Privacy - Aware Monitoring for Trustworthiness. Sathya Rao |
| 2012 | Efficient Comparison of Encrypted Biometric Templates. Michael Dorn, Peter Wackersreuther, Christian Böhm |
| 2012 | Encrypted Adaptive Storage Model - Analysis and Performance Tests. Marcin Gorawski, Michal Lorek, Michal Gorawski |
| 2012 | Flexible Regulation with Privacy Points. Hanno Langweg, Lisa Rajbhandari |
| 2012 | How Much Network Security Must Be Visible in Web Browsers? Tobias Hirsch, Luigi Lo Iacono, Ina Wechsung |
| 2012 | On the Security of the Non-Repudiation of Forwarding Service. Rainer Schick, Christoph Ruland |
| 2012 | PASSIVE: Policy-Assessed System-Level Security of Sensitive Information Processing in Virtualised Environments. Panagiotis Rizomiliotis, Charalambos Skianis |
| 2012 | Policy and Security Configuration Management. Henrik Plate |
| 2012 | Profitability and Cost Management of Trustworthy Composite Services. Hisain Elshaafi, Jimmy McGibney, Dmitri Botvich |
| 2012 | Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process. Kashif Syed, Pavol Zavarsky, Dale Lindskog, Ron Ruhl, Shaun Aghili |
| 2012 | Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases. Ta Vinh Thong, Levente Buttyán |
| 2012 | Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities. Marc-Michael Bergfeld, Holger Bock, Roderick Bloem, Jan Blonk, Gregory Conti, Kurt Dietrich, Matthias Junk, Florian Schreiner, Stephan Spitz, Johannes Winter |
| 2012 | Short and Efficient Identity-Based Undeniable Signature Scheme. Rouzbeh Behnia, Swee-Huay Heng, Che-Sheng Gan |
| 2012 | Towards the Secure Provision and Consumption in the Internet of Services. Luca Viganò |
| 2012 | Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings Simone Fischer-Hübner, Sokratis K. Katsikas, Gerald Quirchmayr |
| 2012 | Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations. Aggeliki Tsohou, Habin Lee, Yacine Rebahi, Mateusz Khalil, Simon Hohberg |
| 2012 | Verification of Security Coherence in Data Warehouse Designs. Ali Salem, Salah Triki, Hanêne Ben-Abdallah, Nouria Harbi, Omar Boussaid |
| 2012 | WebSand: Server-Driven Outbound Web-Application Sandboxing. Martin Johns, Joachim Posegga |
| 2012 | uTRUSTit - Usable Trust in the Internet of Things. Christina Hochleitner, Cornelia Graf, Peter Wolkerstorfer, Manfred Tscheligi |