Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

14 results
Keywords : Integrity
Image document

Guaranteeing Correctness of Bulk Operations in Outsourced Databases

Luca Ferretti , Michele Colajanni , Mirco Marchetti
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.37-51, ⟨10.1007/978-3-319-41483-6_3⟩
Conference papers hal-01633666v1
Image document

Integrity of Electronic Patient Records

Joris Hulstijn , Jan van Der Jagt , Pieter Heijboer
10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.378-391, ⟨10.1007/978-3-642-22878-0_32⟩
Conference papers hal-01589094v1
Image document

Anonygator: Privacy and Integrity Preserving Data Aggregation

Krishna P. N. Puttaswamy , Ranjita Bhagwan , Venkata N. Padmanabhan
ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.85-106, ⟨10.1007/978-3-642-16955-7_5⟩
Conference papers hal-01055270v1
Image document

Using Data Analytics to Detect Possible Collusion in a Multiple Choice Quiz Test

Michael Lang
20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.757-762, ⟨10.1007/978-3-030-85447-8_63⟩
Conference papers hal-03648132v1
Image document

On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries

Chan Nam Ngo , Tran Khanh Dang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.101-110, ⟨10.1007/978-3-642-36818-9_11⟩
Conference papers hal-01480224v1
Image document

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation

Shuhui Hou , Ryoichi Sasaki , Tetsutaro Uehara , Siuming Yiu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers hal-01480187v1
Image document

Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images

Giuseppe Cattaneo , Gianluca Roscigno , Umberto Ferraro Petrillo
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.643-652, ⟨10.1007/978-3-642-55032-4_66⟩
Conference papers hal-01397282v1
Image document

ASPAS: As Secure as Possible Available Systems

Houssam Yactine , Ali Shoker , Georges Younes
21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2021, Valletta, Malta. pp.57-73, ⟨10.1007/978-3-030-78198-9_4⟩
Conference papers hal-03384864v1
Image document

Result Integrity Verification of Outsourced Frequent Itemset Mining

Boxiang Dong , Ruilin Liu , Hui (wendy) Wang
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.258-265, ⟨10.1007/978-3-642-39256-6_17⟩
Conference papers hal-01490709v1
Image document

Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations

Bo Zhang , Boxiang Dong , Wendy Wang
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.311-324, ⟨10.1007/978-3-319-61176-1_17⟩
Conference papers hal-01684361v1
Image document

Integrity Assurance for Outsourced Databases without DBMS Modification

Wei Wei , Ting Yu
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.1-16, ⟨10.1007/978-3-662-43936-4_1⟩
Conference papers hal-01284838v1
Image document

Data Integrity Verification in Column-Oriented NoSQL Databases

Grisha Weintraub , Ehud Gudes
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.165-181, ⟨10.1007/978-3-319-95729-6_11⟩
Conference papers hal-01954409v1
Image document

Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments

Irfan Ahmed , Aleksandar Zoranic , Salman Javaid , Golden Richard Iii , Vassil Roussev
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.305-328, ⟨10.1007/978-3-642-41148-9_21⟩
Conference papers hal-01460630v1
Image document

Assured Cloud-Based Data Analysis with ClusterBFT

Julian James Stephen , Patrick Eugster
14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.82-102, ⟨10.1007/978-3-642-45065-5_5⟩
Conference papers hal-01480793v1