| 2016 | A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN. Nazila Gol Mohammadi, Maritta Heisel |
| 2016 | Automatic Enforcement of Security Properties. José Miguel Horcas, Mónica Pinto, Lidia Fuentes |
| 2016 | Bottom-Up Cell Suppression that Preserves the Missing-at-random Condition. Yoshitaka Kameya, Kentaro Hayashi |
| 2016 | Design of a Log Management Infrastructure Using Meta-Network Analysis. Vasileios Anastopoulos, Sokratis K. Katsikas |
| 2016 | Modelling Secure Cloud Computing Systems from a Security Requirements Perspective. Shaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan J. Delaney |
| 2016 | The Far Side of Mobile Application Integrated Development Environments. Christos Lyvas, Nikolaos Pitropakis, Costas Lambrinoudakis |
| 2016 | Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems. Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis |
| 2016 | Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings Sokratis K. Katsikas, Costas Lambrinoudakis, Steven Furnell |
| 2016 | Understanding the Privacy Goal Intervenability. Rene Meis, Maritta Heisel |