Filter your results
- 24
- 1
- 24
- 1
- 25
- 25
- 25
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Guaranteeing Correctness of Bulk Operations in Outsourced Databases30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.37-51, ⟨10.1007/978-3-319-41483-6_3⟩
Conference papers
hal-01633666v1
|
||
|
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.347-363, ⟨10.1007/978-3-319-41483-6_24⟩
Conference papers
hal-01633685v1
|
||
|
Private and Secure Secret Shared MapReduce (Extended Abstract)30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.151-160, ⟨10.1007/978-3-319-41483-6_11⟩
Conference papers
hal-01633670v1
|
||
|
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.19-34, ⟨10.1007/978-3-319-41483-6_2⟩
Conference papers
hal-01633679v1
|
||
|
Reasoning About Firewall Policies Through Refinement and Composition30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.268-284, ⟨10.1007/978-3-319-41483-6_19⟩
Conference papers
hal-01633676v1
|
||
|
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.285-294, ⟨10.1007/978-3-319-41483-6_20⟩
Conference papers
hal-01633669v1
|
||
|
Sharing-Habits Based Privacy Control in Social Networks30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.217-232, ⟨10.1007/978-3-319-41483-6_16⟩
Conference papers
hal-01633684v1
|
||
|
Practical Differentially Private Modeling of Human Movement Data30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.170-178, ⟨10.1007/978-3-319-41483-6_13⟩
Conference papers
hal-01633671v1
|
||
|
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.313-327
Conference papers
hal-01633672v1
|
||
|
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers
hal-01633675v1
|
||
|
A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.122-129, ⟨10.1007/978-3-319-41483-6_9⟩
Conference papers
hal-01633664v1
|
||
|
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.179-195, ⟨10.1007/978-3-319-41483-6_14⟩
Conference papers
hal-01633678v1
|
||
|
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.61-76, ⟨10.1007/978-3-319-41483-6_5⟩
Conference papers
hal-01633680v1
|
||
|
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.331-346, ⟨10.1007/978-3-319-41483-6_23⟩
Conference papers
hal-01633686v1
|
||
|
Mining Hierarchical Temporal Roles with Multiple Metrics30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.79-95, ⟨10.1007/978-3-319-41483-6_6⟩
Conference papers
hal-01633674v1
|
||
|
Data and Applications Security and Privacy XXXSpringer International Publishing, LNCS-9766, 2016, Lecture Notes in Computer Science, 978-3-319-41482-9. ⟨10.1007/978-3-319-41483-6⟩
Books
hal-01633682v1
|
||
|
Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.106-121, ⟨10.1007/978-3-319-41483-6_8⟩
Conference papers
hal-01633665v1
|
||
|
Data Governance and Transparency for Collaborative Systems30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.199-216, ⟨10.1007/978-3-319-41483-6_15⟩
Conference papers
hal-01633673v1
|
||
|
Formalizing Threat Models for Virtualized Systems30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.251-267, ⟨10.1007/978-3-319-41483-6_18⟩
Conference papers
hal-01633687v1
|
||
|
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.52-60, ⟨10.1007/978-3-319-41483-6_4⟩
Conference papers
hal-01633688v1
|
||
|
Counteracting Active Attacks in Social Network Graphs30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.233-248, ⟨10.1007/978-3-319-41483-6_17⟩
Conference papers
hal-01633668v1
|
||
|
Towards Creating Believable Decoy Project Folders for Detecting Data Theft30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.161-169, ⟨10.1007/978-3-319-41483-6_12⟩
Conference papers
hal-01633683v1
|
||
|
Access Control for the Shuffle Index30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.130-147, ⟨10.1007/978-3-319-41483-6_10⟩
Conference papers
hal-01633667v1
|
||
|
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers
hal-01633677v1
|
||
|
Deciphering Text from Touchscreen Key Taps30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.3-18, ⟨10.1007/978-3-319-41483-6_1⟩
Conference papers
hal-01633681v1
|