Filter your results
- 90
- 88
- 1
- 1
- 90
- 9
- 1
- 41
- 6
- 4
- 5
- 5
- 8
- 4
- 10
- 6
- 9
- 17
- 6
- 10
- 90
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments6th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2017, Oslo, Norway. pp.75-82, ⟨10.1007/978-3-319-67262-5_6⟩
Conference papers
hal-01677625v1
|
||
|
OFELIA – A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.61-74, ⟨10.1007/978-3-642-30436-1_6⟩
Conference papers
hal-01518233v1
|
||
|
When Both Transmitting and Receiving Energies Matter: An Application of Network Coding in Wireless Body Area NetworksInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.119-128, ⟨10.1007/978-3-642-23041-7_12⟩
Conference papers
hal-01587861v1
|
||
|
Business Process-Based Legitimacy of Data Access Framework for Enterprise Information Systems Protection12th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Sep 2018, Poznan, Poland. pp.146-160, ⟨10.1007/978-3-319-99040-8_12⟩
Conference papers
hal-01878879v1
|
||
|
Multiparty Authorization Framework for Data Sharing in Online Social Networks23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.29-43, ⟨10.1007/978-3-642-22348-8_5⟩
Conference papers
hal-01586571v1
|
||
|
Privacy-Preserving Access Control in Publicly Readable Storage SystemsDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.327-342, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_22⟩
Book sections
hal-01619745v1
|
||
|
Integrating Attributes into Role-Based Access Control29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.242-249, ⟨10.1007/978-3-319-20810-7_17⟩
Conference papers
hal-01745833v1
|
||
|
From MDM to DB2: A Case Study of Security Enforcement Migration26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers
hal-01534771v1
|
||
|
Certificate-Based Encryption Scheme with General Access Structure11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.41-55, ⟨10.1007/978-3-642-33260-9_3⟩
Conference papers
hal-01551717v1
|
||
|
Identification of Access Control Policy Sentences from Natural Language Policy Documents31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.82-100, ⟨10.1007/978-3-319-61176-1_5⟩
Conference papers
hal-01684368v1
|
||
|
Usage Control Model Specification in XACML Policy Language11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.68-79, ⟨10.1007/978-3-642-33260-9_5⟩
Conference papers
hal-01551723v1
|
||
|
Network Functions Virtualization Access Control as a Service34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.100-117, ⟨10.1007/978-3-030-49669-2_6⟩
Conference papers
hal-03243624v1
|
||
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers
hal-00737170v1
|
||
|
JACPoL: A Simple but Expressive JSON-based Access Control Policy LanguageWISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers
hal-01802720v1
|
||
|
Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.137-152, ⟨10.1007/978-3-319-24018-3_9⟩
Conference papers
hal-01442558v1
|
||
|
Access Control and Query Verification for Untrusted Databases27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.211-225, ⟨10.1007/978-3-642-39256-6_14⟩
Conference papers
hal-01490706v1
|
||
|
Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region's eHealth Platform5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.146-159, ⟨10.1007/978-3-642-14282-6_12⟩
Conference papers
hal-01061162v1
|
||
|
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.105-119, ⟨10.1007/978-3-030-22312-0_8⟩
Conference papers
hal-03744313v1
|
||
|
Enforcement of Privacy Requirements28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.272-285, ⟨10.1007/978-3-642-39218-4_21⟩
Conference papers
hal-01463860v1
|
||
|
Re-designing the Web’s Access Control System23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.4-11, ⟨10.1007/978-3-642-22348-8_2⟩
Conference papers
hal-01586586v1
|
||
|
Securing bluetooth low energy locks from unauthorizedaccess and surveillance11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.319-338, ⟨10.1007/978-3-319-70395-4_16⟩
Conference papers
hal-01819142v1
|
||
|
An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.377-392, ⟨10.1007/978-3-030-81242-3_22⟩
Conference papers
hal-03677023v1
|
||
|
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.38-53, ⟨10.1007/978-3-642-21040-2_3⟩
Conference papers
hal-01573308v1
|
||
|
A User-to-User Relationship-Based Access Control Model for Online Social Networks26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.8-24, ⟨10.1007/978-3-642-31540-4_2⟩
Conference papers
hal-01534764v1
|
||
|
A Model for Trust-Based Access Control and Delegation in Mobile Clouds27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.242-257, ⟨10.1007/978-3-642-39256-6_16⟩
Conference papers
hal-01490708v1
|
||
|
Role Mining under Role-Usage Cardinality Constraint27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.150-161, ⟨10.1007/978-3-642-30436-1_13⟩
Conference papers
hal-01518246v1
|
||
|
Secure Resource Sharing for Embedded Protected Module Architectures9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers
hal-01442554v1
|
||
|
Type Checking Privacy Policies in the π-calculus35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.181-195, ⟨10.1007/978-3-319-19195-9_12⟩
Conference papers
hal-01767337v1
|
||
|
A Framework for Threat Assessment in Access Control Systems27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.187-198, ⟨10.1007/978-3-642-30436-1_16⟩
Conference papers
hal-01518243v1
|
||
|
Visitor Access Control Scheme Utilizing Social Relationship in the Real World4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.95-107, ⟨10.1007/978-3-642-13446-3_7⟩
Conference papers
hal-01061321v1
|