From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field.- Policy Engineering in RBAC and ABAC.- Comprehensive Security Assurance Measures for Virtualized Server Environments.- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty.- Asymptotic Behavior of Attack Graph Games.- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything.- Protecting Resources and Regulating Access in Cloud-based Object Storage.- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations.- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives.- Access Privacy in the Cloud.- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center.- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers.- Supporting Users in Cloud Plan Selection.- Distributed Services Attestation in IoT.- Exploiting Data Sensitivity on Partitioned Data.- A Review of Graph Approaches to Network Security Analytics.- Advanced Biometric Technologies: Emerging Scenarios and Research Trends.- Attribute-Based Encryption: Applications and Future Directions.- Static Analysis for Security Vetting of Android Apps.- Breaking Bad: Forecasting Adversarial Android Bad Behavior.- Bot or Human? A Behavior-based Online Bot Detection System.- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks.- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation.