Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : CBCU|ECRIC
labStructName_s : Computer Security Division
Image document

Mining Likely Properties of Access Control Policies via Association Rule Mining

Jeehyun Hwang , Tao Xie , Vincent Hu , Mine Altunay
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.193-208, ⟨10.1007/978-3-642-13739-6_13⟩
Conference papers hal-01056688v1
Image document

Distributed Middleware Enforcement of Event Flow Security Policy

Matteo Migliavacca , Ioannis Papagiannis , David M. Eyers , Brian Shand , Jean Bacon , et al.
ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.334-354, ⟨10.1007/978-3-642-16955-7_17⟩
Conference papers hal-01055277v1
Image document

Enforcing End-to-End Application Security in the Cloud

Jean Bacon , David Evans , David M. Eyers , Matteo Migliavacca , Peter Pietzuch , et al.
ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.293-312, ⟨10.1007/978-3-642-16955-7_15⟩
Conference papers hal-01055278v1