Filter your results
- 55
- 54
- 1
- 55
- 7
- 1
- 23
- 4
- 4
- 2
- 2
- 5
- 2
- 7
- 5
- 7
- 8
- 6
- 3
- 55
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Secure and Authenticated Access to LLN Resources Through Policy Constraints9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.271-280, ⟨10.1007/978-3-319-24018-3_18⟩
Conference papers
hal-01442549v1
|
||
|
Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.137-152, ⟨10.1007/978-3-319-24018-3_9⟩
Conference papers
hal-01442558v1
|
||
|
Access Control and Query Verification for Untrusted Databases27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.211-225, ⟨10.1007/978-3-642-39256-6_14⟩
Conference papers
hal-01490706v1
|
||
|
Re-designing the Web’s Access Control System23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.4-11, ⟨10.1007/978-3-642-22348-8_2⟩
Conference papers
hal-01586586v1
|
||
|
An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.377-392, ⟨10.1007/978-3-030-81242-3_22⟩
Conference papers
hal-03677023v1
|
||
|
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.38-53, ⟨10.1007/978-3-642-21040-2_3⟩
Conference papers
hal-01573308v1
|
||
|
A User-to-User Relationship-Based Access Control Model for Online Social Networks26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.8-24, ⟨10.1007/978-3-642-31540-4_2⟩
Conference papers
hal-01534764v1
|
||
|
A Model for Trust-Based Access Control and Delegation in Mobile Clouds27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.242-257, ⟨10.1007/978-3-642-39256-6_16⟩
Conference papers
hal-01490708v1
|
||
|
Secure Resource Sharing for Embedded Protected Module Architectures9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers
hal-01442554v1
|
||
|
Type Checking Privacy Policies in the π-calculus35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.181-195, ⟨10.1007/978-3-319-19195-9_12⟩
Conference papers
hal-01767337v1
|
||
|
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers
hal-01633675v1
|
||
|
Attribute-Aware Relationship-Based Access Control for Online Social Networks28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.292-306, ⟨10.1007/978-3-662-43936-4_19⟩
Conference papers
hal-01284863v1
|
||
|
An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.185-194, ⟨10.1007/978-3-642-40779-6_16⟩
Conference papers
hal-01492820v1
|
||
|
Information Security Theory and PracticeSpringer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books
hal-03173895v1
|
||
|
Blockchain Based Access Control17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.206-220, ⟨10.1007/978-3-319-59665-5_15⟩
Conference papers
hal-01800124v1
|
||
|
Towards User-Oriented RBAC Model27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.81-96, ⟨10.1007/978-3-642-39256-6_6⟩
Conference papers
hal-01490719v1
|
||
|
Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments6th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2017, Oslo, Norway. pp.75-82, ⟨10.1007/978-3-319-67262-5_6⟩
Conference papers
hal-01677625v1
|
||
|
When Both Transmitting and Receiving Energies Matter: An Application of Network Coding in Wireless Body Area NetworksInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.119-128, ⟨10.1007/978-3-642-23041-7_12⟩
Conference papers
hal-01587861v1
|
||
|
Multiparty Authorization Framework for Data Sharing in Online Social Networks23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.29-43, ⟨10.1007/978-3-642-22348-8_5⟩
Conference papers
hal-01586571v1
|
||
|
Integrating Attributes into Role-Based Access Control29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.242-249, ⟨10.1007/978-3-319-20810-7_17⟩
Conference papers
hal-01745833v1
|
||
|
From MDM to DB2: A Case Study of Security Enforcement Migration26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers
hal-01534771v1
|
||
|
Certificate-Based Encryption Scheme with General Access Structure11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.41-55, ⟨10.1007/978-3-642-33260-9_3⟩
Conference papers
hal-01551717v1
|
||
|
Identification of Access Control Policy Sentences from Natural Language Policy Documents31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.82-100, ⟨10.1007/978-3-319-61176-1_5⟩
Conference papers
hal-01684368v1
|
||
|
Usage Control Model Specification in XACML Policy Language11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.68-79, ⟨10.1007/978-3-642-33260-9_5⟩
Conference papers
hal-01551723v1
|
||
|
Network Functions Virtualization Access Control as a Service34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.100-117, ⟨10.1007/978-3-030-49669-2_6⟩
Conference papers
hal-03243624v1
|
||
|
JACPoL: A Simple but Expressive JSON-based Access Control Policy LanguageWISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers
hal-01802720v1
|
||
|
Object-Tagged RBAC Model for the Hadoop Ecosystem31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.63-81, ⟨10.1007/978-3-319-61176-1_4⟩
Conference papers
hal-01684349v1
|
||
|
Towards a Pervasive Access Control within Video Surveillance Systems1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.289-303, ⟨10.1007/978-3-642-40511-2_20⟩
Conference papers
hal-01217394v1
|
||
|
SocACL: An ASP-Based Access Control Language for Online Social Networks14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.207-210, ⟨10.1007/978-3-642-40779-6_20⟩
Conference papers
hal-01492825v1
|
||
|
Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.233-241, ⟨10.1007/978-3-319-20810-7_16⟩
Conference papers
hal-01745825v1
|
- 1
- 2