Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

549 results
Deposit type : Fulltext
Image document

Efficient and Generalized Decentralized Monitoring of Regular Languages

Yliès Falcone , Tom Cornebize , Jean-Claude Fernandez
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.66-83, ⟨10.1007/978-3-662-43613-4_5⟩
Conference papers hal-00972559v1
Image document

Metrics for Differential Privacy in Concurrent Systems

Lili Xu , Konstantinos Chatzikokolakis , Huimin Lin
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.199-215, ⟨10.1007/978-3-662-43613-4_13⟩
Conference papers hal-00879140v2
Image document

One-Time Biometrics for Online Banking and Electronic Payment Authentication

Aude Plateaux , Patrick Lacharme , Christophe Rosenberger , Audun Jøsang
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers hal-01076676v1
Image document

Behave: Behavioral Cache for Web Content

Davide Frey , Mathieu Goessens , Anne-Marie Kermarrec
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.89-103, ⟨10.1007/978-3-662-43352-2_8⟩
Conference papers hal-01079976v1
Image document

Specification and Deployment of Integrated Security Policies for Outsourced Data

Anis Bkakria , Frédéric Cuppens , Nora Cuppens-Bouhlahia , David Gross-Amblard
28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers hal-01087467v1
Image document

A Study of RPL DODAG Version Attacks

Anthéa Mayzaud , Anuj Sehgal , Rémi Badonnel , Isabelle Chrisment , Jürgen Schönwälder
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.92-104, ⟨10.1007/978-3-662-43862-6_12⟩
Conference papers hal-01090993v1
Image document

Outsourcing Mobile Security in the Cloud

Gaëtan Hurel , Rémi Badonnel , Abdelkader Lahmadi , Olivier Festor
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.69-73, ⟨10.1007/978-3-662-43862-6_9⟩
Conference papers hal-01092239v1
Image document

Higher-Order Languages: Bisimulation and Coinductive Equivalences (Extended Abstract)

Davide Sangiorgi
Coalgebraic Methods in Computer Science, Apr 2014, Grenoble, France. pp.3 - 9, ⟨10.1007/978-3-662-44124-4_1⟩
Conference papers hal-01092815v1
Image document

A Model-Based Certification Framework for the EnergyBus Standard

Alexander Graf-Brill , Holger Hermanns , Hubert Garavel
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.84-99, ⟨10.1007/978-3-662-43613-4_6⟩
Conference papers hal-01098360v1
Image document

LINC: A Compact Yet Powerful Coordination Environment

Maxime Louvel , François Pacull
Coordination Models and Languages : 16th IFIP WG 6.1 International Conference, COORDINATION 2014, Held as Part of the 9th International Federated Conferences on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014, Proceedings, Jun 2014, Berlin, Germany. pp.83-98, ⟨10.1007/978-3-662-43376-8_6⟩
Conference papers hal-01274824v1
Image document

Integrity Assurance for Outsourced Databases without DBMS Modification

Wei Wei , Ting Yu
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.1-16, ⟨10.1007/978-3-662-43936-4_1⟩
Conference papers hal-01284838v1
Image document

Optimizing Integrity Checks for Join Queries in the Cloud

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.33-48, ⟨10.1007/978-3-662-43936-4_3⟩
Conference papers hal-01284840v1
Image document

Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials

David Derler , Christian Hanser , Daniel Slamanig
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.49-65, ⟨10.1007/978-3-662-43936-4_4⟩
Conference papers hal-01284842v1
Image document

Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud

Samira Barouti , Feras Aljumah , Dima Alhadidi , Mourad Debbabi
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.82-97, ⟨10.1007/978-3-662-43936-4_6⟩
Conference papers hal-01284843v1
Image document

Data Leakage Quantification

Sokratis Vavilis , Milan Petković , Nicola Zannone
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.98-113, ⟨10.1007/978-3-662-43936-4_7⟩
Conference papers hal-01284845v1
Image document

Toward Software Diversity in Heterogeneous Networked Systems

Chu Huang , Sencun Zhu , Robert Erbacher
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.114-129, ⟨10.1007/978-3-662-43936-4_8⟩
Conference papers hal-01284848v1
Image document

Design Patterns for Multiple Stakeholders in Social Computing

Pooya Mehregan , Philip L. Fong
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.163-178, ⟨10.1007/978-3-662-43936-4_11⟩
Conference papers hal-01284852v1
Image document

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure

Yuan Hong , Jaideep Vaidya , Haibing Lu , Lingyu Wang
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers hal-01284854v1
Image document

Dynamic Workflow Adjustment with Security Constraints

Haibing Lu , Yuan Hong , Yanjiang Yang , Yi Fang , Lian Duan
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.211-226, ⟨10.1007/978-3-662-43936-4_14⟩
Conference papers hal-01284857v1
Image document

Consistent Query Plan Generation in Secure Cooperative Data Access

Meixing Le , Krishna Kant , Sushil Jajodia
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.227-242, ⟨10.1007/978-3-662-43936-4_15⟩
Conference papers hal-01284858v1
Image document

Hunting the Unknown

Elisa Costante , Jerry Den Hartog , Milan Petković , Sandro Etalle , Mykola Pechenizkiy
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers hal-01284860v1
Image document

Mining Attribute-Based Access Control Policies from Logs

Zhongyuan Xu , Scott D. Stoller
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩
Conference papers hal-01284862v1
Image document

Attribute-Aware Relationship-Based Access Control for Online Social Networks

Yuan Cheng , Jaehong Park , Ravi Sandhu
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.292-306, ⟨10.1007/978-3-662-43936-4_19⟩
Conference papers hal-01284863v1
Image document

Randomly Partitioned Encryption for Cloud Databases

Tahmineh Sanamrad , Lucas Braun , Donald Kossmann , Ramarathnam Venkatesan
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.307-323, ⟨10.1007/978-3-662-43936-4_20⟩
Conference papers hal-01284865v1
Image document

Towards Secure Cloud Database with Fine-Grained Access Control

Michael G. Solomon , Vaidy Sunderam , Li Xiong
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.324-338, ⟨10.1007/978-3-662-43936-4_21⟩
Conference papers hal-01284867v1
Image document

Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database

Giovanni Di Crescenzo , Debra Cook , Allen Mcintosh , Euthimios Panagos
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.339-355, ⟨10.1007/978-3-662-43936-4_22⟩
Conference papers hal-01284868v1
Image document

LPM: Layered Policy Management for Software-Defined Networks

Wonkyu Han , Hongxin Hu , Gail-Joon Ahn
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.356-363, ⟨10.1007/978-3-662-43936-4_23⟩
Conference papers hal-01284871v1
Image document

On Minimizing the Size of Encrypted Databases

Giovanni Di Crescenzo , David Shallcross
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.364-372, ⟨10.1007/978-3-662-43936-4_24⟩
Conference papers hal-01284872v1
Image document

Efficient and Enhanced Solutions for Content Sharing in DRM Systems

Michal Davidson , Ehud Gudes , Tamir Tassa
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.373-381, ⟨10.1007/978-3-662-43936-4_25⟩
Conference papers hal-01284873v1
Image document

A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters

Vikas G. Ashok , Ravi Mukkamala
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.382-389, ⟨10.1007/978-3-662-43936-4_26⟩
Conference papers hal-01284874v1