Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

39 results
Image document

An Administrative Model for Relationship-Based Access Control

Scott D. Stoller
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.53-68, ⟨10.1007/978-3-319-20810-7_4⟩
Conference papers hal-01745824v1
Image document

Understanding Public Value Creation in the Delivery of Electronic Services

Luis F. Luna-Reyes , Rodrigo Sandoval-Almazan , Gabriel Puron-Cid , Sergio Picazo-Vela , Dolores E. Luna , et al.
16th International Conference on Electronic Government (EGOV), Sep 2017, St. Petersburg, Russia. pp.378-385, ⟨10.1007/978-3-319-64677-0_31⟩
Conference papers hal-01702999v1
Image document

Data and Applications Security and Privacy XXXV

Ken Barker , Kambiz Ghazinour
Springer International Publishing, LNCS-12840, 2021, Lecture Notes in Computer Science, 978-3-030-81241-6. ⟨10.1007/978-3-030-81242-3⟩
Books hal-03677022v1

Electronic Government

Hans J. Scholl , J. Ramon Gil-Garcia , Marijn Janssen , Evangelos Kalampokis , Ida Lindgren , et al.
Springer International Publishing, LNCS-12850, 2021, Lecture Notes in Computer Science, 978-3-030-84788-3. ⟨10.1007/978-3-030-84789-0⟩
Books hal-04175107v1
Image document

Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid

Hu Chun , Kui Ren , Wei Jiang
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.119-134, ⟨10.1007/978-3-319-20810-7_8⟩
Conference papers hal-01745836v1
Image document

A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters

Vikas G. Ashok , Ravi Mukkamala
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.382-389, ⟨10.1007/978-3-662-43936-4_26⟩
Conference papers hal-01284874v1
Image document

What Users Prefer and Why: A User Study on Effective Presentation Styles of Opinion Summarization

Xiaojun Yuan , Ning Sa , Grace Begany , Huahai Yang
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.249-264, ⟨10.1007/978-3-319-22668-2_20⟩
Conference papers hal-01599891v1
Image document

Understanding the Factors that Affect Smart City and Community Initiatives: Lessons from Local Governments in the United States

Xiaoyi Yerden , J. Ramon Gil-Garcia , Mila Gasco-Hernandez , G. Brian Burke
20th International Conference on Electronic Government (EGOV), Sep 2021, Granada, Spain. pp.205-216, ⟨10.1007/978-3-030-84789-0_15⟩
Conference papers hal-04175092v1
Image document

Algorithm Diversity for Resilient Systems

Scott D. Stoller , Yanhong A. Liu
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.359-378, ⟨10.1007/978-3-030-22479-0_19⟩
Conference papers hal-02384586v1
Image document

Open Government Data Ecosystems: Linking Transparency for Innovation with Transparency for Participation and Accountability

Luigi Reggi , Sharon Dawes
5th International Conference on Electronic Government and the Information Systems Perspective (EGOV), Sep 2016, Porto, Portugal. pp.74-86, ⟨10.1007/978-3-319-44421-5_6⟩
Conference papers hal-01636461v1
Image document

Cost Bounds of Multicast Light-trees in WDM Networks

Fen Zhou , Miklos Molnar , Bernard Cousin , Chunming Qiao
IFIP Networking conference, May 2010, Chennai, India. pp.339-350, ⟨10.1007/978-3-642-12963-6_27⟩
Conference papers hal-00541058v2
Image document

Dynamic Workflow Adjustment with Security Constraints

Haibing Lu , Yuan Hong , Yanjiang Yang , Yi Fang , Lian Duan
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.211-226, ⟨10.1007/978-3-662-43936-4_14⟩
Conference papers hal-01284857v1
Image document

A Systematic Literature Review of the Relationships Between Policy Analysis and Information Technologies: Understanding and Integrating Multiple Conceptualizations

Cesar Renteria , J. Ramon Gil-Garcia
9th International Conference on Electronic Participation (ePart), Sep 2017, St. Petersburg, Russia. pp.112-124, ⟨10.1007/978-3-319-64322-9_10⟩
Conference papers hal-01703332v1
Image document

Mining Hierarchical Temporal Roles with Multiple Metrics

Scott D. Stoller , Thang Bui
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.79-95, ⟨10.1007/978-3-319-41483-6_6⟩
Conference papers hal-01633674v1
Image document

Big Data Analytics as a Service for Business Intelligence

Zhaohao Sun , Huasheng Zou , Kenneth Strang
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.200-211, ⟨10.1007/978-3-319-25013-7_16⟩
Conference papers hal-01448039v1
Image document

Policy Analysis for Administrative Role Based Access Control without Separate Administration

Ping Yang , Mikhail Gofman , Zijiang Yang
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.49-64, ⟨10.1007/978-3-642-39256-6_4⟩
Conference papers hal-01490717v1
Image document

Information Strategies for Open Government: Challenges and Prospects for Deriving Public Value from Government Transparency

Sharon S. Dawes , Natalie Helbig
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.50-60, ⟨10.1007/978-3-642-14799-9_5⟩
Conference papers hal-01056566v1
Image document

Exploring on the Role of Open Government Data in Emergency Management

Yumei Chen , Theresa A. Pardo , Shanshan Chen
16th International Conference on Electronic Government (EGOV), Sep 2017, St. Petersburg, Russia. pp.303-313, ⟨10.1007/978-3-319-64677-0_25⟩
Conference papers hal-01702976v1
Image document

Open Innovation and Co-creation in the Public Sector: Understanding the Role of Intermediaries

Mila Gasco-Hernandez , Rodrigo Sandoval-Almazan , J. Ramon Gil-Garcia
9th International Conference on Electronic Participation (ePart), Sep 2017, St. Petersburg, Russia. pp.140-148, ⟨10.1007/978-3-319-64322-9_12⟩
Conference papers hal-01703331v1
Image document

Information Flow Containment: A Practical Basis for Malware Defense

R. Sekar
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.1-3, ⟨10.1007/978-3-642-22348-8_1⟩
Conference papers hal-01586591v1
Image document

Values in Design - Building Bridges between RE, HCI and Ethics

Christian Detweiler , Alina Pommeranz , Jeroen Hoven , Helen Nissenbaum
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.746-747, ⟨10.1007/978-3-642-23768-3_145⟩
Conference papers hal-01596979v1
Image document

Towards an Evaluation Model for Open Government: A Preliminary Proposal

Rodrigo Sandoval-Almazan , J. Ramon Gil-Garcia
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.47-58, ⟨10.1007/978-3-662-44426-9_4⟩
Conference papers hal-01401724v1
Image document

Heuristics for Social Games with a Purpose

Aneta Takhtamysheva , Tim Decker
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.445-448, ⟨10.1007/978-3-642-33542-6_49⟩
Conference papers hal-01556110v1
Image document

Proactively Extracting IoT Device Capabilities: An Application to Smart Homes

Andy Dolan , Indrakshi Ray , Suryadipta Majumdar
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.42-63, ⟨10.1007/978-3-030-49669-2_3⟩
Conference papers hal-03243641v1
Image document

Game-Based Multi-MD with QoS Computation Offloading for Mobile Edge Computing of Limited Computation Capacity

Junyan Hu , Chubo Liu , Kenli Li , Keqin Li
16th IFIP International Conference on Network and Parallel Computing (NPC), Aug 2019, Hohhot, China. pp.16-27, ⟨10.1007/978-3-030-30709-7_2⟩
Conference papers hal-03770553v1
Image document

Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies

Thang Bui , Scott D. Stoller , Shikhar Sharma
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.101-119, ⟨10.1007/978-3-319-61176-1_6⟩
Conference papers hal-01684356v1
Image document

Mining Attribute-Based Access Control Policies from Logs

Zhongyuan Xu , Scott D. Stoller
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩
Conference papers hal-01284862v1
Image document

Expiration and Revocation of Keys for Attribute-Based Signatures

Stephen R. Tate , Roopa Vishwanathan
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.153-169, ⟨10.1007/978-3-319-20810-7_10⟩
Conference papers hal-01745835v1
Image document

Image Pixelization with Differential Privacy

Liyue Fan
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.148-162, ⟨10.1007/978-3-319-95729-6_10⟩
Conference papers hal-01954420v1
Image document

Building Understanding of Smart City Initiatives

Suha Alawadhi , Armando Aldama-Nalda , Hafedh Chourabi , J. Ramon Gil-Garcia , Sofia Leung , et al.
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.40-53, ⟨10.1007/978-3-642-33489-4_4⟩
Conference papers hal-01543596v1