Filter your results
- 17
- 1
- 17
- 1
- 18
- 1
- 1
- 1
- 1
- 1
- 2
- 3
- 3
- 1
- 1
- 3
- 18
- 7
- 1
- 1
- 1
- 1
- 1
- 8
- 4
- 7
- 7
- 5
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
On the Identification of Property Based Generalizations in Microdata Anonymization24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.81-96, ⟨10.1007/978-3-642-13739-6_6⟩
Conference papers
hal-01056667v1
|
||
|
Data and Applications Security and Privacy XXVISpringer, LNCS-7371, pp.329, 2012, Lecture Notes in Computer Science, 978-3-642-31539-8. ⟨10.1007/978-3-642-31540-4⟩
Books
hal-01164720v1
|
||
|
A Distributed Mechanism to Protect Against DDoS Attacks31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.529-540, ⟨10.1007/978-3-319-61176-1_29⟩
Conference papers
hal-01684374v1
|
||
|
A Model for Trust-Based Access Control and Delegation in Mobile Clouds27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.242-257, ⟨10.1007/978-3-642-39256-6_16⟩
Conference papers
hal-01490708v1
|
||
|
Privacy Preserving Record Matching Using Automated Semi-trusted Broker29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.103-118, ⟨10.1007/978-3-319-20810-7_7⟩
Conference papers
hal-01745819v1
|
||
|
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.42-63, ⟨10.1007/978-3-030-49669-2_3⟩
Conference papers
hal-03243641v1
|
||
|
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.38-47, ⟨10.1007/978-3-319-95729-6_3⟩
Conference papers
hal-01954422v1
|
||
|
Adversarial Sampling Attacks Against Phishing Detection33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.83-101, ⟨10.1007/978-3-030-22479-0_5⟩
Conference papers
hal-02384598v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
||
|
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.274-281, ⟨10.1007/978-3-642-39256-6_19⟩
Conference papers
hal-01159831v1
|
||
|
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.61-76, ⟨10.1007/978-3-319-41483-6_5⟩
Conference papers
hal-01633680v1
|
||
|
fQuery: SPARQL Query Rewriting to Enforce Data ConfidentialityDBSEC 2010 : 24th annual IFIP WG 11.3 working conference on data and applications security and privacy XXIV, Jun 2010, Roma, Italy. pp.146-161, ⟨10.1007/978-3-642-13739-6_10⟩
Conference papers
hal-01056741v1
|
||
|
Multilevel Secure Data Stream Processing23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.122-137, ⟨10.1007/978-3-642-22348-8_11⟩
Conference papers
hal-01586572v1
|
||
|
Using Trust-Based Information Aggregation for Predicting Security Level of Systems24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.241-256, ⟨10.1007/978-3-642-13739-6_16⟩
Conference papers
hal-01056685v1
|
||
|
ELITE: zEro Links Identity managemenT systEmDBSec 2014 : 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.195-210, ⟨10.1007/978-3-662-43936-4_13⟩
Conference papers
hal-01159837v1
|
||
|
Stream Processing with Secure Information Flow Constraints29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.311-329, ⟨10.1007/978-3-319-20810-7_22⟩
Conference papers
hal-01745816v1
|
||
|
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the CloudsDBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers
hal-01159841v1
|
||
|
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.426-440, ⟨10.1007/978-3-642-36818-9_47⟩
Conference papers
hal-01213982v1
|