Filter your results
- 25
- 1
- 25
- 1
- 26
- 26
- 26
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Multiparty Authorization Framework for Data Sharing in Online Social Networks23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.29-43, ⟨10.1007/978-3-642-22348-8_5⟩
Conference papers
hal-01586571v1
|
||
|
Selective Disclosure on Encrypted Documents23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.255-262, ⟨10.1007/978-3-642-22348-8_21⟩
Conference papers
hal-01586575v1
|
||
|
A Robust Remote User Authentication Scheme against Smart Card Security Breach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers
hal-01586587v1
|
||
|
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.293-300, ⟨10.1007/978-3-642-22348-8_25⟩
Conference papers
hal-01586593v1
|
||
|
Re-designing the Web’s Access Control System23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.4-11, ⟨10.1007/978-3-642-22348-8_2⟩
Conference papers
hal-01586586v1
|
||
Data and Applications Security and Privacy XXVSpringer, LNCS-6818, 2011, Lecture Notes in Computer Science, 978-3-642-22347-1. ⟨10.1007/978-3-642-22348-8⟩
Books
hal-01586570v1
|
|||
|
Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.44-59, ⟨10.1007/978-3-642-22348-8_6⟩
Conference papers
hal-01586589v1
|
||
|
Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩
Conference papers
hal-01586579v1
|
||
|
An Index Structure for Private Data Outsourcing23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.247-254, ⟨10.1007/978-3-642-22348-8_20⟩
Conference papers
hal-01586578v1
|
||
|
Privacy-Preserving Data Mining: A Game-Theoretic Approach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.186-200, ⟨10.1007/978-3-642-22348-8_15⟩
Conference papers
hal-01586580v1
|
||
|
N-Gram Based Secure Similar Document Detection23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.239-246, ⟨10.1007/978-3-642-22348-8_19⟩
Conference papers
hal-01586584v1
|
||
|
Query Processing in Private Data Outsourcing Using Anonymization23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.138-153, ⟨10.1007/978-3-642-22348-8_12⟩
Conference papers
hal-01586588v1
|
||
|
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.280-292, ⟨10.1007/978-3-642-22348-8_24⟩
Conference papers
hal-01586581v1
|
||
|
Verifiable Secret Sharing with Comprehensive and Efficient Public Verification23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.217-230, ⟨10.1007/978-3-642-22348-8_17⟩
Conference papers
hal-01586582v1
|
||
|
Information Flow Containment: A Practical Basis for Malware Defense23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.1-3, ⟨10.1007/978-3-642-22348-8_1⟩
Conference papers
hal-01586591v1
|
||
|
Cooperative Data Access in Multi-cloud Environments23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.14-28, ⟨10.1007/978-3-642-22348-8_4⟩
Conference papers
hal-01586583v1
|
||
|
Enhancing CardSpace Authentication Using a Mobile Device23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.201-216, ⟨10.1007/978-3-642-22348-8_16⟩
Conference papers
hal-01586573v1
|
||
|
Private Database Search with Sublinear Query Time23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.154-169, ⟨10.1007/978-3-642-22348-8_13⟩
Conference papers
hal-01586594v1
|
||
|
Preserving Privacy in Structural Neuroimages23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.301-308, ⟨10.1007/978-3-642-22348-8_26⟩
Conference papers
hal-01586590v1
|
||
|
Multilevel Secure Data Stream Processing23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.122-137, ⟨10.1007/978-3-642-22348-8_11⟩
Conference papers
hal-01586572v1
|
||
|
Accurate Accident Reconstruction in VANET23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.271-279, ⟨10.1007/978-3-642-22348-8_23⟩
Conference papers
hal-01586576v1
|
||
|
Efficient Distributed Linear Programming with Limited Disclosure23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.170-185, ⟨10.1007/978-3-642-22348-8_14⟩
Conference papers
hal-01586592v1
|
||
|
A New Leakage-Resilient IBE Scheme in the Relative Leakage Model23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.263-270, ⟨10.1007/978-3-642-22348-8_22⟩
Conference papers
hal-01586577v1
|
||
|
Integrated Management of Security Policies23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.12-13, ⟨10.1007/978-3-642-22348-8_3⟩
Conference papers
hal-01586574v1
|
||
|
History-Dependent Inference Control of Queries by Dynamic Policy Adaption23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.106-121, ⟨10.1007/978-3-642-22348-8_10⟩
Conference papers
hal-01586585v1
|
||
|
An Optimization Model for the Extended Role Mining Problem23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.76-89, ⟨10.1007/978-3-642-22348-8_8⟩
Conference papers
hal-01586595v1
|