Accepted Papers
Full papers
-
Silvio Ranise and Riccardo Traverso.
ALPS: An Action Language for Policy Specification and Automated Safety Analysis
-
Pankaj Pandey and Einar Snekkenes.
Using Prediction Markets to Hedge Information Security Risks
-
Vangalur Alagar and Kaiyu Wan.
Integrating Trust and Economic Theories with Knowledge Science for Dependable
Service Automation
-
Jason Crampton and Charles Morisset.
Monotonicity and Completeness in Attribute-based Access Control
-
Charles Morisset, Iryna Yevseyeva, Thomas Gross and Aad Van
Moorsel.
A Formal Model for Soft Enforcement: Influencing the Decision-Maker
-
Tobias Bamert, Christian Decker, Roger Wattenhofer and Samuel Welten.
BlueWallet: The Secure Bitcoin Wallet
-
Sonia Santiago, Santiago Escobar, Catherine Meadows and Jose Meseguer.
A Formal Definition of Protocol Indistinguishability and its
Verification Using Maude-NPA
-
Aleksandar S. Dimovski.
Ensuring Secure Non-interference of Programs by Game Semantics
-
Jason Crampton and James Sellwood.
Caching and Auditing in the RPPM Model
-
Thibaud Antignac and Daniel Le Métayer.
Privacy Architectures: Reasoning About Data Minimisation and Integrity
-
Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori and Andrea Saracino.
Stateful Usage Control for Android Mobile Devices
Short papers
-
Ginés Dólera Tormo, Félix Gómez Mármol and
Gregorio Martínez Pérez.
ROMEO: ReputatiOn Model Enhancing OpenID Simulator
-
Gamze Canova, Melanie Volkamer, Clemens Bergmann and Roland Borza.
NoPhish - An Anti-Phishing Education App
-
Filip Jurnečka, Martin Stehlík and Vashek Matyas.
Evaluation of key management schemes in wireless sensor networks
-
Paolo Modesti.
Efficient Java Code Generation of
Security Protocols specified in AnB/AnBx
-
Michael Backes, Niklas Grimm and Aniket Kate.
Lime: Data Lineage in the Malicious Environment
-
Asad Ali and Maribel Fernández.
Hybrid Enforcement of Category-Based Access Control