Filter your results
- 14
- 14
- 14
- 2
- 1
- 3
- 1
- 3
- 2
- 2
- 14
- 2
- 1
- 1
- 1
- 11
- 4
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Using Trust-Based Information Aggregation for Predicting Security Level of Systems24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.241-256, ⟨10.1007/978-3-642-13739-6_16⟩
Conference papers
hal-01056685v1
|
||
|
On the Identification of Property Based Generalizations in Microdata Anonymization24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.81-96, ⟨10.1007/978-3-642-13739-6_6⟩
Conference papers
hal-01056667v1
|
||
|
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the CloudsDBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers
hal-01159841v1
|
||
|
ELITE: zEro Links Identity managemenT systEmDBSec 2014 : 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.195-210, ⟨10.1007/978-3-662-43936-4_13⟩
Conference papers
hal-01159837v1
|
||
|
Evaluating CVSS Base Score Using Vulnerability Rewards Programs31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.62-75, ⟨10.1007/978-3-319-33630-5_5⟩
Conference papers
hal-01369542v1
|
||
|
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.179-193, ⟨10.1007/978-3-319-33630-5_13⟩
Conference papers
hal-01369552v1
|
||
|
Multi-keyword Similarity Search over Encrypted Cloud Data29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.52-65, ⟨10.1007/978-3-642-55415-5_5⟩
Conference papers
hal-01370353v1
|
||
|
A Model for Trust-Based Access Control and Delegation in Mobile Clouds27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.242-257, ⟨10.1007/978-3-642-39256-6_16⟩
Conference papers
hal-01490708v1
|
||
|
Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.97-112, ⟨10.1007/978-3-642-39256-6_7⟩
Conference papers
hal-01490726v1
|
||
|
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.61-76, ⟨10.1007/978-3-319-41483-6_5⟩
Conference papers
hal-01633680v1
|
||
|
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.20-40, ⟨10.1007/978-3-319-61176-1_2⟩
Conference papers
hal-01684353v1
|
||
|
Privacy Preserving Record Matching Using Automated Semi-trusted Broker29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.103-118, ⟨10.1007/978-3-319-20810-7_7⟩
Conference papers
hal-01745819v1
|
||
|
AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.23-42, ⟨10.1007/978-3-030-22479-0_2⟩
Conference papers
hal-02384601v1
|
||
|
That’s My DNA: Detecting Malicious Tampering of Synthesized DNA33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.61-80, ⟨10.1007/978-3-030-22479-0_4⟩
Conference papers
hal-02384604v1
|