Filter your results
- 6
- 6
- 6
- 1
- 2
- 2
- 1
- 6
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
6 results
|
|
sorted by
|
|
Toward Unified and Flexible Security Policies Enforceable within the Cloud13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.181-186, ⟨10.1007/978-3-642-38541-4_15⟩
Conference papers
hal-01489456v1
|
||
|
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.355-367, ⟨10.1007/978-3-642-12368-9_29⟩
Conference papers
hal-01056071v1
|
||
|
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.41-55, ⟨10.1007/978-3-319-93524-9_3⟩
Conference papers
hal-01875518v1
|
||
|
Securing Data Provenance in the CloudInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.145-160, ⟨10.1007/978-3-642-27585-2_12⟩
Conference papers
hal-01481501v1
|
||
|
Fair Private Set Intersection with a Semi-trusted Arbiter27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.128-144, ⟨10.1007/978-3-642-39256-6_9⟩
Conference papers
hal-01490721v1
|
||
|
Flexible and Dynamic Consent-CapturingInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.119-131, ⟨10.1007/978-3-642-27585-2_10⟩
Conference papers
hal-01481499v1
|