Filter your results
- 12
- 12
- 12
- 2
- 1
- 1
- 1
- 1
- 2
- 1
- 3
- 1
- 1
- 12
- 2
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
12 results
|
|
sorted by
|
|
Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.3-19, ⟨10.1007/978-3-319-61176-1_1⟩
Conference papers
hal-01684347v1
|
||
|
The Effect of the Existence of Defective Items in Assembly OperationsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.449-454, ⟨10.1007/978-3-662-44733-8_56⟩
Conference papers
hal-01387287v1
|
||
|
Transfer Learning for Content-Based Recommender Systems Using Tree Matching1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.387-399
Conference papers
hal-01506793v1
|
||
|
Data Integrity Verification in Column-Oriented NoSQL Databases32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.165-181, ⟨10.1007/978-3-319-95729-6_11⟩
Conference papers
hal-01954409v1
|
||
|
Efficient and Enhanced Solutions for Content Sharing in DRM Systems28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.373-381, ⟨10.1007/978-3-662-43936-4_25⟩
Conference papers
hal-01284873v1
|
||
|
Publishing Differentially Private Medical Events DataInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.219-235, ⟨10.1007/978-3-319-45507-5_15⟩
Conference papers
hal-01635024v1
|
||
|
Simulation Analysis of Sweet Pepper Harvesting OperationsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.441-448, ⟨10.1007/978-3-662-44733-8_55⟩
Conference papers
hal-01387286v1
|
||
|
Private and Secure Secret Shared MapReduce (Extended Abstract)30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.151-160, ⟨10.1007/978-3-319-41483-6_11⟩
Conference papers
hal-01633670v1
|
||
|
PUA Detection Based on Bundle Installer Characteristics34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.261-273, ⟨10.1007/978-3-030-49669-2_15⟩
Conference papers
hal-03243639v1
|
||
|
Code Type Revealing Using Experiments Framework26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.193-206, ⟨10.1007/978-3-642-31540-4_15⟩
Conference papers
hal-01534762v1
|
||
|
An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.377-392, ⟨10.1007/978-3-030-81242-3_22⟩
Conference papers
hal-03677023v1
|
||
|
A Topology Based Flow Model for Computing Domain Reputation29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.277-292, ⟨10.1007/978-3-319-20810-7_20⟩
Conference papers
hal-01745814v1
|