
| Risk-Aware Role-Based Access Control |
Liang Chen and Jason Crampton. |
| New Modalities for Access Control Logics:
Permission, Control and Ratification |
Valerio Genovese and Deepak Garg |
| A Proof-Carrying File System with Revocable
and Use-Once Certificates |
Jamie Morgenstern, Deepak Garg and Frank Pfenning |
| Location Privacy in Relation
with Trusted Peers |
Klaus Rechert and Benjamin
Greschbach |
| Secure architecure for the
integration of RFID and sensors in personal area networks |
Pablo Najera, Rodrigo Roman and
Javier Lopez |
| Hiding the Policy in
Cryptographic Access Control |
Sascha Müller and Stefan
Katzenbeisser |
| The Fairness Requirement for
Non-repudiation Protocols |
Wojciech Jamroga, Sjouke Mauw
and Matthijs Melissen |
| The Role of Data Integrity in EU
Digital Signature Legislation - Achieving Statutory Trust for
Sanitizable Signature Schemes |
Henrich Christopher Pöhls and Focke Höhne. |
| Mutual Remote Attestation:
Enabling System Cloning for TPM based Platforms |
Benjamin Justus, Ulrich Greveler and Dennis Löhr |
| Accepting Information with
a Pinch of Salt: Handling Untrusted Information Sources |
Sadie Creese, Michael Goldsmith and Syed Sadiqur Rahman |
| Security Notions of Biometric
Remote Authentication Revisited |
Neyire Deniz Sarier |
| Automated Analysis of Infinite
State Workflows with Access Control Policies |
Alessandro Armando and Silvio Ranise |