Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : Institut Charles Delaunay
labStructName_s : Computer Security Division
Image document

Mining Likely Properties of Access Control Policies via Association Rule Mining

Jeehyun Hwang , Tao Xie , Vincent Hu , Mine Altunay
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.193-208, ⟨10.1007/978-3-642-13739-6_13⟩
Conference papers hal-01056688v1
Image document

Modeling User Behavior in P2P Live Video Streaming Systems through a Bayesian Network

Ihsan Ullah , Grégory Bonnet , Guillaume Doyen , Dominique Gaïti
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.2-13, ⟨10.1007/978-3-642-13986-4_2⟩
Conference papers hal-01056628v1
Image document

Towards a P2P-Based Deployment of Network Management Information

Rafik Makhloufi , Grégory Bonnet , Guillaume Doyen , Dominique Gaïti
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.26-37, ⟨10.1007/978-3-642-13986-4_4⟩
Conference papers hal-01056626v1