Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

20 results
Image document

Deciphering Text from Touchscreen Key Taps

Haritabh Gupta , Shamik Sural , Vijayalakshmi Atluri , Jaideep Vaidya
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.3-18, ⟨10.1007/978-3-319-41483-6_1⟩
Conference papers hal-01633681v1
Image document

Analysis of TRBAC with Dynamic Temporal Role Hierarchies

Emre Uzun , Vijayalakshmi Atluri , Jaideep Vaidya , Shamik Sural
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.297-304, ⟨10.1007/978-3-642-39256-6_22⟩
Conference papers hal-01490714v1
Image document

An Anti-jamming Strategy When it Is Unknown Which Receivers Will Face with Smart Interference

Andrey Garnaev , Wade Trappe , Athina Petropulu
International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2018, Boston, MA, United States. pp.195-206, ⟨10.1007/978-3-030-02931-9_16⟩
Conference papers hal-02269717v1
Image document

An Optimization Model for the Extended Role Mining Problem

Emre Uzun , Vijayalakshmi Atluri , Haibing Lu , Jaideep Vaidya
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.76-89, ⟨10.1007/978-3-642-22348-8_8⟩
Conference papers hal-01586595v1
Image document

Role Mining in the Presence of Noise

Jaideep Vaidya , Vijayalakshmi Atluri , Qi Guo , Haibing Lu
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.97-112, ⟨10.1007/978-3-642-13739-6_7⟩
Conference papers hal-01056666v1
Image document

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure

Yuan Hong , Jaideep Vaidya , Haibing Lu , Lingyu Wang
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers hal-01284854v1
Image document

Migrating from DAC to RBAC

Emre Uzun , David Lorenzi , Vijayalakshmi Atluri , Jaideep Vaidya , Shamik Sural
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.69-84, ⟨10.1007/978-3-319-20810-7_5⟩
Conference papers hal-01745820v1
Image document

Enabling the Deployment of ABAC Policies in RBAC Systems

Gunjan Batra , Vijayalakshmi Atluri , Jaideep Vaidya , Shamik Sural
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.51-68, ⟨10.1007/978-3-319-95729-6_4⟩
Conference papers hal-01954419v1
Image document

Bargaining over Fair Channel Sharing Between Wi-Fi and LTE-U Networks

Andrey Garnaev , Shweta Sagari , Wade Trappe
15th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2017, St. Petersburg, Russia. pp.3-15, ⟨10.1007/978-3-319-61382-6_1⟩
Conference papers hal-01675421v1
Image document

Toward Mining of Temporal Roles

Barsha Mitra , Shamik Sural , Vijayalakshmi Atluri , Jaideep Vaidya
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.65-80, ⟨10.1007/978-3-642-39256-6_5⟩
Conference papers hal-01490718v1
Image document

Towards User-Oriented RBAC Model

Haibing Lu , Yuan Hong , Yanjiang Yang , Lian Duan , Nazia Badar
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.81-96, ⟨10.1007/978-3-642-39256-6_6⟩
Conference papers hal-01490719v1

Data and Applications Security and Privacy XXVIII

Vijay Atluri , Günther Pernul
Springer, Lecture Notes in Computer Science (LNCS-8566), 2014, 978-3-662-45501-2. ⟨10.1007/978-3-662-43936-4⟩
Books hal-01285073v1
Image document

An Analytic Framework for Open Government Policy Design Processes

Alex Ingrams
5th International Conference on Electronic Government and the Information Systems Perspective (EGOV), Sep 2016, Porto, Portugal. pp.203-214, ⟨10.1007/978-3-319-44421-5_16⟩
Conference papers hal-01636457v1
Image document

Public Accountability ICT Support: A Detailed Account of Public Accountability Process and Tasks

Rui Pedro Lourenço , Suzanne Piotrowski , Alex Ingrams
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.105-117, ⟨10.1007/978-3-319-22479-4_8⟩
Conference papers hal-01412240v1
Image document

“Please Connect Me to a Specialist”: Scrutinising ‘Recipient Design’ in Interaction with an Artificial Conversational Agent

Iuliia Avgustis , Aleksandr Shirokov , Netta Iivari
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.155-176, ⟨10.1007/978-3-030-85610-6_10⟩
Conference papers hal-04215505v1
Image document

Data and Applications Security and Privacy XXXIV

Anoop Singhal , Jaideep Vaidya
Springer International Publishing, LNCS-12122, 2020, Lecture Notes in Computer Science, 978-3-030-49668-5. ⟨10.1007/978-3-030-49669-2⟩
Books hal-03243621v1
Image document

Efficient Distributed Linear Programming with Limited Disclosure

Yuan Hong , Jaideep Vaidya , Haibing Lu
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.170-185, ⟨10.1007/978-3-642-22348-8_14⟩
Conference papers hal-01586592v1
Image document

Preventing Unauthorized Data Flows

Emre Uzun , Gennaro Parlato , Vijayalakshmi Atluri , Anna Lisa Ferrara , Jaideep Vaidya , et al.
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.41-62, ⟨10.1007/978-3-319-61176-1_3⟩
Conference papers hal-01684345v1
Image document

Proportional Fair Information Freshness Under Jamming

Andrey Garnaev , Jing Zhong , Wuyang Zhang , Roy D. Yates , Wade Trappe
17th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2019, Bologna, Italy. pp.91-102, ⟨10.1007/978-3-030-30523-9_8⟩
Conference papers hal-02881744v1
Image document

On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems

Youssef Souissi , Nicolas Debande , Sami Mekki , Sylvain Guilley , Ali Maalaoui , et al.
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.169-178, ⟨10.1007/978-3-642-30955-7_15⟩
Conference papers hal-01534305v1