Search - Data and Applications Security and Privacy XXVI Access content directly

Filter your results

4 results
Keywords : Security
Image document

From MDM to DB2: A Case Study of Security Enforcement Migration

Nikolay Yakovets , Jarek Gryz , Stephanie Hazlewood , Paul Van Run
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers hal-01534771v1
Image document

A User-to-User Relationship-Based Access Control Model for Online Social Networks

Yuan Cheng , Jaehong Park , Ravi Sandhu
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.8-24, ⟨10.1007/978-3-642-31540-4_2⟩
Conference papers hal-01534764v1
Image document

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

Ding Wang , Chun-Guang Ma , Peng Wu
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers hal-01534767v1
Image document

Decentralized Semantic Threat Graphs

Simon N. Foley , William M. Fitzgerald
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.177-192, ⟨10.1007/978-3-642-31540-4_14⟩
Conference papers hal-01534768v1