Filter your results
- 10
- 10
- 10
- 1
- 2
- 1
- 2
- 3
- 2
- 10
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Inference Leakage Detection for Authorization Policies over RDF Data29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.346-361, ⟨10.1007/978-3-319-20810-7_24⟩
Conference papers
hal-01745813v1
|
||
|
Rule Enforcement with Third Parties in Secure Cooperative Data Access27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.282-288, ⟨10.1007/978-3-642-39256-6_20⟩
Conference papers
hal-01490712v1
|
||
|
Usage Control Model Specification in XACML Policy Language11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.68-79, ⟨10.1007/978-3-642-33260-9_5⟩
Conference papers
hal-01551723v1
|
||
|
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.38-53, ⟨10.1007/978-3-642-21040-2_3⟩
Conference papers
hal-01573308v1
|
||
|
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers
hal-01633675v1
|
||
|
Trust Agreement in Wireless Mesh Networks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.336-350, ⟨10.1007/978-3-642-21040-2_24⟩
Conference papers
hal-01573304v1
|
||
|
The Design of a Single Funding Point Charging Architecture18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.148-160, ⟨10.1007/978-3-642-32808-4_14⟩
Conference papers
hal-01543145v1
|
||
|
Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.106-121, ⟨10.1007/978-3-319-41483-6_8⟩
Conference papers
hal-01633665v1
|
||
|
Enabling the Autonomic Management of Federated Identity Providers7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.100-111, ⟨10.1007/978-3-642-38998-6_14⟩
Conference papers
hal-01489959v1
|
||
|
ROAC: A Role-Oriented Access Control Model6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.113-127, ⟨10.1007/978-3-642-30955-7_11⟩
Conference papers
hal-01534310v1
|