Filter your results
- 22
- 22
- 22
- 22
- 22
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Improving Virtualization Security by Splitting Hypervisor into Smaller Components26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.298-313, ⟨10.1007/978-3-642-31540-4_23⟩
Conference papers
hal-01534758v1
|
||
|
Logics for Security and Privacy26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.1-7, ⟨10.1007/978-3-642-31540-4_1⟩
Conference papers
hal-01534776v1
|
||
|
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.41-55, ⟨10.1007/978-3-642-31540-4_4⟩
Conference papers
hal-01534757v1
|
||
|
A User-to-User Relationship-Based Access Control Model for Online Social Networks26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.8-24, ⟨10.1007/978-3-642-31540-4_2⟩
Conference papers
hal-01534764v1
|
||
|
Security Vulnerabilities of User Authentication Scheme Using Smart Card26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩
Conference papers
hal-01534770v1
|
||
|
Privacy-Preserving Subgraph Discovery26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.161-176, ⟨10.1007/978-3-642-31540-4_13⟩
Conference papers
hal-01534763v1
|
||
|
Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.56-73, ⟨10.1007/978-3-642-31540-4_5⟩
Conference papers
hal-01534773v1
|
||
|
Privacy Consensus in Anonymization Systems via Game Theory26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.74-89, ⟨10.1007/978-3-642-31540-4_6⟩
Conference papers
hal-01534775v1
|
||
|
From MDM to DB2: A Case Study of Security Enforcement Migration26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers
hal-01534771v1
|
||
|
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.223-238, ⟨10.1007/978-3-642-31540-4_17⟩
Conference papers
hal-01534769v1
|
||
|
Randomizing Smartphone Malware Profiles against Statistical Mining Techniques26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.239-254, ⟨10.1007/978-3-642-31540-4_18⟩
Conference papers
hal-01534774v1
|
||
|
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers
hal-01534767v1
|
||
|
Layered Security Architecture for Masquerade Attack Detection26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.255-262, ⟨10.1007/978-3-642-31540-4_19⟩
Conference papers
hal-01534760v1
|
||
|
Security Limitations of Using Secret Sharing for Data Outsourcing26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.145-160, ⟨10.1007/978-3-642-31540-4_12⟩
Conference papers
hal-01534766v1
|
||
|
Uniform Obfuscation for Location Privacy26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.90-105, ⟨10.1007/978-3-642-31540-4_7⟩
Conference papers
hal-01534755v1
|
||
|
Decentralized Semantic Threat Graphs26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.177-192, ⟨10.1007/978-3-642-31540-4_14⟩
Conference papers
hal-01534768v1
|
||
|
Code Type Revealing Using Experiments Framework26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.193-206, ⟨10.1007/978-3-642-31540-4_15⟩
Conference papers
hal-01534762v1
|
||
|
Enforcing Subscription-Based Authorization Policies in Cloud Scenarios26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.314-329, ⟨10.1007/978-3-642-31540-4_24⟩
Conference papers
hal-01534756v1
|
||
|
Distributed Data Federation without Disclosure of User Existence26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.282-297, ⟨10.1007/978-3-642-31540-4_22⟩
Conference papers
hal-01534759v1
|
||
|
Automated and Efficient Analysis of Role-Based Access Control with Attributes26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.25-40, ⟨10.1007/978-3-642-31540-4_3⟩
Conference papers
hal-01534765v1
|
||
|
Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.129-144, ⟨10.1007/978-3-642-31540-4_11⟩
Conference papers
hal-01534761v1
|
||
|
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.263-273, ⟨10.1007/978-3-642-31540-4_20⟩
Conference papers
hal-01534772v1
|