Filter your results
- 26
- 1
- 26
- 26
- 26
- 26
- 3
- 1
- 1
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers
hal-01284854v1
|
||
|
Attribute-Aware Relationship-Based Access Control for Online Social Networks28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.292-306, ⟨10.1007/978-3-662-43936-4_19⟩
Conference papers
hal-01284863v1
|
||
|
LPM: Layered Policy Management for Software-Defined Networks28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.356-363, ⟨10.1007/978-3-662-43936-4_23⟩
Conference papers
hal-01284871v1
|
||
|
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.49-65, ⟨10.1007/978-3-662-43936-4_4⟩
Conference papers
hal-01284842v1
|
||
|
Randomly Partitioned Encryption for Cloud Databases28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.307-323, ⟨10.1007/978-3-662-43936-4_20⟩
Conference papers
hal-01284865v1
|
||
|
On Minimizing the Size of Encrypted Databases28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.364-372, ⟨10.1007/978-3-662-43936-4_24⟩
Conference papers
hal-01284872v1
|
||
|
FSquaDRA: Fast Detection of Repackaged Applications28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers
hal-01285035v1
|
||
|
Who, When, and Where? Location Proof Assertion for Mobile Devices28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.146-162, ⟨10.1007/978-3-662-43936-4_10⟩
Conference papers
hal-01285030v1
|
||
|
A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.382-389, ⟨10.1007/978-3-662-43936-4_26⟩
Conference papers
hal-01284874v1
|
||
|
Hunting the Unknown28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers
hal-01284860v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
||
|
Incremental Analysis of Evolving Administrative Role Based Access Control Policies28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.260-275, ⟨10.1007/978-3-662-43936-4_17⟩
Conference papers
hal-01285032v1
|
||
|
Dynamic Workflow Adjustment with Security Constraints28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.211-226, ⟨10.1007/978-3-662-43936-4_14⟩
Conference papers
hal-01284857v1
|
||
|
Toward Software Diversity in Heterogeneous Networked Systems28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.114-129, ⟨10.1007/978-3-662-43936-4_8⟩
Conference papers
hal-01284848v1
|
||
|
Design Patterns for Multiple Stakeholders in Social Computing28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.163-178, ⟨10.1007/978-3-662-43936-4_11⟩
Conference papers
hal-01284852v1
|
||
|
Consistent Query Plan Generation in Secure Cooperative Data Access28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.227-242, ⟨10.1007/978-3-662-43936-4_15⟩
Conference papers
hal-01284858v1
|
||
|
ELITE: zEro Links Identity managemenT systEmDBSec 2014 : 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.195-210, ⟨10.1007/978-3-662-43936-4_13⟩
Conference papers
hal-01159837v1
|
||
|
Integrity Assurance for Outsourced Databases without DBMS Modification28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.1-16, ⟨10.1007/978-3-662-43936-4_1⟩
Conference papers
hal-01284838v1
|
||
|
Efficient and Enhanced Solutions for Content Sharing in DRM Systems28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.373-381, ⟨10.1007/978-3-662-43936-4_25⟩
Conference papers
hal-01284873v1
|
||
|
Data Leakage Quantification28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.98-113, ⟨10.1007/978-3-662-43936-4_7⟩
Conference papers
hal-01284845v1
|
||
|
Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.339-355, ⟨10.1007/978-3-662-43936-4_22⟩
Conference papers
hal-01284868v1
|
||
|
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the CloudsDBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers
hal-01159841v1
|
||
|
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.82-97, ⟨10.1007/978-3-662-43936-4_6⟩
Conference papers
hal-01284843v1
|
||
|
Mining Attribute-Based Access Control Policies from Logs28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩
Conference papers
hal-01284862v1
|
||
|
Towards Secure Cloud Database with Fine-Grained Access Control28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.324-338, ⟨10.1007/978-3-662-43936-4_21⟩
Conference papers
hal-01284867v1
|
||
|
Optimizing Integrity Checks for Join Queries in the Cloud28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.33-48, ⟨10.1007/978-3-662-43936-4_3⟩
Conference papers
hal-01284840v1
|