Filter your results
- 18
- 2
- 18
- 2
- 20
- 3
- 1
- 3
- 1
- 1
- 3
- 3
- 3
- 2
- 20
- 3
- 1
- 1
- 1
- 1
- 1
- 7
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Enabling the Autonomic Management of Federated Identity Providers7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.100-111, ⟨10.1007/978-3-642-38998-6_14⟩
Conference papers
hal-01489959v1
|
||
|
A Framework for Blockchain-Based Verification of Integrity and Authenticity13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.196-208, ⟨10.1007/978-3-030-33716-2_15⟩
Conference papers
hal-03182608v1
|
||
|
Coordination Models and LanguagesSimon Bliudze; Laura Bocchi. 12134, 2020, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-50029-0⟩
Books
hal-03168525v1
|
||
|
Towards Automated Trust Establishment in Federated Identity Management7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.33-48, ⟨10.1007/978-3-642-38323-6_3⟩
Conference papers
hal-01468183v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-7394, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32805-3⟩
Books
hal-01540895v1
|
||
|
Enhanced Mobile Broadband as Enabler for 5G: Actions from the Framework of the 5G-DRIVE Project15th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2019, Hersonissos, Greece. pp.31-45, ⟨10.1007/978-3-030-19909-8_3⟩
Conference papers
hal-02363853v1
|
||
|
Cue Now, Reflect Later: A Study of Delayed Reflection of Diary Events15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.367-375, ⟨10.1007/978-3-319-22698-9_24⟩
Conference papers
hal-01609425v1
|
||
|
Integrating Security Services in Cloud Service Stores9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.226-239, ⟨10.1007/978-3-319-18491-3_19⟩
Conference papers
hal-01416230v1
|
||
|
Relational Concurrent Refinement: Timed Refinement13th Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 31th International Conference on FORmal TEchniques for Networked and Distributed Systems (FORTE), Jun 2011, Reykjavik,, Iceland. pp.121-137, ⟨10.1007/978-3-642-21461-5_8⟩
Conference papers
hal-01583329v1
|
||
|
How to Develop a Security Controls Oriented Reference Architecture for Cloud, IoT and SDN/NFV Platforms12th IFIP International Conference on Trust Management (TM), Jul 2018, Toronto, ON, Canada. pp.1-14, ⟨10.1007/978-3-319-95276-5_1⟩
Conference papers
hal-01855991v1
|
||
|
A Multi-privacy Policy Enforcement System6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.297-310, ⟨10.1007/978-3-642-20769-3_24⟩
Conference papers
hal-01559449v1
|
||
|
Extracting Access Control and Conflict Resolution Policies from European Data Protection Law7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.59-72, ⟨10.1007/978-3-642-31668-5_5⟩
Conference papers
hal-01517595v1
|
||
|
Automated Machine Learning for Studying the Trade-Off Between Predictive Accuracy and Interpretability3rd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2019, Canterbury, United Kingdom. pp.48-66, ⟨10.1007/978-3-030-29726-8_4⟩
Conference papers
hal-02520064v1
|
||
|
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education15th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2021, Virtual, United Kingdom. pp.35-45, ⟨10.1007/978-3-030-81111-2_4⟩
Conference papers
hal-04041065v1
|
||
|
A Cloud Based Data Integration Framework13th Working Confeence on Virtual Enterpries (PROVE), Oct 2012, Bournemouth, United Kingdom. pp.177-185, ⟨10.1007/978-3-642-32775-9_18⟩
Conference papers
hal-01520472v1
|
||
|
How Real Is Unreal?16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.273-288, ⟨10.1007/978-3-319-68059-0_18⟩
Conference papers
hal-01679807v1
|
||
|
Security-as-a-Service in Multi-cloud and Federated Cloud Environments9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.251-261, ⟨10.1007/978-3-319-18491-3_21⟩
Conference papers
hal-01416233v1
|
||
|
When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home Devices15th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2021, Virtual, United Kingdom. pp.115-126, ⟨10.1007/978-3-030-81111-2_10⟩
Conference papers
hal-04041072v1
|
||
|
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm8th World Conference on Information Security Education (WISE), Jul 2013, Auckland, New Zealand. pp.68-82, ⟨10.1007/978-3-642-39377-8_8⟩
Conference papers
hal-01463660v1
|
||
|
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC 2021), IFIP : International Federation for Information Processing, Jun 2021, Oslo, Norway. pp.196-209, ⟨10.1007/978-3-030-78120-0_13⟩
Conference papers
hal-03345757v1
|