Filter your results
- 5
- 1
- 5
- 1
- 6
- 1
- 2
- 1
- 1
- 1
- 6
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers
hal-00737170v1
|
||
ICT Systems Security and Privacy ProtectionSpringer, AICT-428, 2014, IFIP Advances in Information and Communication Technology, 978-3-642-55414-8. ⟨10.1007/978-3-642-55415-5⟩
Books
hal-01370409v1
|
|||
|
IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.148-160, ⟨10.1007/978-3-642-40552-5_14⟩
Conference papers
hal-01497012v1
|
||
|
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.105-118, ⟨10.1007/978-3-319-33630-5_8⟩
Conference papers
hal-01369546v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
||
|
Delegation of Obligations and Responsibility26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩
Conference papers
hal-00606018v1
|