Filter your results
- 3
- 3
- 3
- 3
- 3
- 1
- 2
- 1
- 3
- 1
- 1
- 1
- 2
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.122-129, ⟨10.1007/978-3-319-41483-6_9⟩
Conference papers
hal-01633664v1
|
||
|
Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.106-121, ⟨10.1007/978-3-319-41483-6_8⟩
Conference papers
hal-01633665v1
|
||
|
Data Type Classification: Hierarchical Class-to-Type Modeling12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.325-343, ⟨10.1007/978-3-319-46279-0_17⟩
Conference papers
hal-01758687v1
|