Filter your results
- 15
- 2
- 2
- 16
- 2
- 1
- 19
- 2
- 1
- 2
- 1
- 1
- 4
- 3
- 2
- 1
- 2
- 19
- 14
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 10
- 9
- 6
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Data and Applications Security and Privacy XXVISpringer, LNCS-7371, pp.329, 2012, Lecture Notes in Computer Science, 978-3-642-31539-8. ⟨10.1007/978-3-642-31540-4⟩
Books
hal-01164720v1
|
||
|
Network Functions Virtualization Access Control as a Service34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.100-117, ⟨10.1007/978-3-030-49669-2_6⟩
Conference papers
hal-03243624v1
|
||
|
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.274-281, ⟨10.1007/978-3-642-39256-6_19⟩
Conference papers
hal-01159831v1
|
||
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers
hal-00737170v1
|
||
ICT Systems Security and Privacy ProtectionSpringer, AICT-428, 2014, IFIP Advances in Information and Communication Technology, 978-3-642-55414-8. ⟨10.1007/978-3-642-55415-5⟩
Books
hal-01370409v1
|
|||
|
IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.148-160, ⟨10.1007/978-3-642-40552-5_14⟩
Conference papers
hal-01497012v1
|
||
|
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.105-118, ⟨10.1007/978-3-319-33630-5_8⟩
Conference papers
hal-01369546v1
|
||
|
Firewall Policies Provisioning Through SDN in the Cloud31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.293-310, ⟨10.1007/978-3-319-61176-1_16⟩
Conference papers
hal-01684362v1
|
||
|
Managing Secure Inter-slice Communication in 5G Network Slice ChainsManaging Secure Inter-slice Communication in 5G Network Slice Chains, pp.24-41, 2020, ⟨10.1007/978-3-030-49669-2_2⟩
Book sections
hal-02876588v1
|
||
|
Detection of Side Channel Attacks Based on Data Tainting in Android SystemsSEC 2017 - 32th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2017, Rome, Italy. pp.205-218, ⟨10.1007/978-3-319-58469-0_14⟩
Conference papers
hal-01648994v1
|
||
|
Ex-SDF: an extended service dependency framework for intrusion impact assessment25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩
Conference papers
hal-00565624v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
||
|
Detection and Response to Data Exfiltration from Internet of Things Android Devices33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.339-354, ⟨10.1007/978-3-319-99828-2_24⟩
Conference papers
hal-02023715v1
|
||
|
fQuery: SPARQL Query Rewriting to Enforce Data ConfidentialityDBSEC 2010 : 24th annual IFIP WG 11.3 working conference on data and applications security and privacy XXIV, Jun 2010, Roma, Italy. pp.146-161, ⟨10.1007/978-3-642-13739-6_10⟩
Conference papers
hal-01056741v1
|
||
|
ELITE: zEro Links Identity managemenT systEmDBSec 2014 : 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.195-210, ⟨10.1007/978-3-662-43936-4_13⟩
Conference papers
hal-01159837v1
|
||
|
Delegation of Obligations and Responsibility26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩
Conference papers
hal-00606018v1
|
||
|
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the CloudsDBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers
hal-01159841v1
|
||
|
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.218-233, ⟨10.1007/978-3-319-18467-8_15⟩
Conference papers
hal-01152528v1
|
||
|
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.426-440, ⟨10.1007/978-3-642-36818-9_47⟩
Conference papers
hal-01213982v1
|