Filter your results
- 3
- 3
- 3
- 1
- 1
- 1
- 3
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Constructing Key Assignment Schemes from Chain Partitions24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.130-145, ⟨10.1007/978-3-642-13739-6_9⟩
Conference papers
hal-01056664v1
|
||
|
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers
hal-01633675v1
|
||
|
Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.330-345, ⟨10.1007/978-3-319-20810-7_23⟩
Conference papers
hal-01745832v1
|