Filter your results
- 15
- 15
- 15
- 2
- 2
- 1
- 2
- 1
- 2
- 1
- 2
- 2
- 2
- 15
- 2
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Many-to-Many Information Flow Policies19th International Conference on Coordination Languages and Models (COORDINATION), Jun 2017, Neuchâtel, Switzerland. pp.159-177, ⟨10.1007/978-3-319-59746-1_9⟩
Conference papers
hal-01657347v1
|
||
|
Temporal-Based Ranking in Heterogeneous Networks11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.23-34, ⟨10.1007/978-3-662-44917-2_3⟩
Conference papers
hal-01403054v1
|
||
|
Worst- and Average-Case Privacy Breaches in Randomization Mechanisms7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.72-86, ⟨10.1007/978-3-642-33475-7_6⟩
Conference papers
hal-01556211v1
|
||
|
Output-sensitive Information flow analysis39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.93-110, ⟨10.1007/978-3-030-21759-4_6⟩
Conference papers
hal-02303984v1
|
||
|
Leveraging Web Intelligence for Information Cascade Detection in Social Streams6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.56-65, ⟨10.1007/978-3-319-89743-1_6⟩
Conference papers
hal-01913877v1
|
||
|
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.253-260, ⟨10.1007/978-3-642-36818-9_26⟩
Conference papers
hal-01480180v1
|
||
|
Forensic Leak Detection for Business Process Models7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.101-113, ⟨10.1007/978-3-642-24212-0_8⟩
Conference papers
hal-01569546v1
|
||
|
Only Connect, Securely39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.75-92, ⟨10.1007/978-3-030-21759-4_5⟩
Conference papers
hal-02313753v1
|
||
|
Quantitative Information Flow under Generic Leakage Functions and Adaptive Adversaries34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.166-181, ⟨10.1007/978-3-662-43613-4_11⟩
Conference papers
hal-01398015v1
|
||
|
Distributed Middleware Enforcement of Event Flow Security PolicyACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.334-354, ⟨10.1007/978-3-642-16955-7_17⟩
Conference papers
hal-01055277v1
|
||
|
Reasoning About Distributed Secrets37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2017, Neuchâtel, Switzerland. pp.156-170, ⟨10.1007/978-3-319-60225-7_11⟩
Conference papers
hal-01658413v1
|
||
|
A Security Policy Model for Agent Based Service-Oriented Architectures1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.13-25, ⟨10.1007/978-3-642-23300-5_2⟩
Conference papers
hal-01590399v1
|
||
|
Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.208-223, ⟨10.1007/978-3-642-30955-7_18⟩
Conference papers
hal-01534306v1
|
||
|
Constructing Inference-Proof Belief Mediators29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.188-203, ⟨10.1007/978-3-319-20810-7_12⟩
Conference papers
hal-01745830v1
|
||
|
Enforcing End-to-End Application Security in the CloudACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.293-312, ⟨10.1007/978-3-642-16955-7_15⟩
Conference papers
hal-01055278v1
|