Accountability in Cloud Service Provision Ecosystems.- Information Management and Data Privacy.- Information Classification Issues.- Data Erasure in Concurrent Software.- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation.- Cloud, Big Data and Virtualization Security.- Security of OS-Level Virtualization Technologies.- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption.- π- Authenticated Encryption for Big Data.- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services.- Network Security and Logging.- Efficient Record-Level Keyless Signatures for Audit Logs.- Static Semantics of Secret Channel Abstractions.- Browser Randomisation against A Quantitative Information Flow Approach.- Attacks and Defenses.- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees.- Denial-of-Service Mitigation for Internet Services.- Spook in Your Attacking an SDN with a Compromised OpenFlow Switch.- Security in Healthcare and Biometrics.- Patients' Privacy Protection against Insurance Companies in eHealth Systems.- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression.- Poster Papers.- Dynamic Enforcement of Dynamic Policies.- Availability by Design.- Pareto Efficient Solutions of Attack Trees.- Verification of Stateful Set-Based Abstractions in the Applied π-Calculus.- Improvement Proposal for the CryptoCloak Application.- Process Tracking for Forensic Readiness.- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.- Differential Privacy and Private Bayesian Inference.- Event Invitations in Privacy-Preserving Formalization and Protocol Design.- Attacks on Privacy-Preserving Biometric Authentication.