Filter your results
- 10
- 2
- 1
- 10
- 10
- 2
- 1
- 3
- 2
- 1
- 1
- 10
- 10
- 1
- 1
- 1
- 1
- 1
- 7
- 6
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.274-281, ⟨10.1007/978-3-642-39256-6_19⟩
Conference papers
hal-01159831v1
|
||
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers
hal-00737170v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
||
|
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.105-118, ⟨10.1007/978-3-319-33630-5_8⟩
Conference papers
hal-01369546v1
|
||
|
Software Defined Networking Reactive Stateful Firewall31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.119-132, ⟨10.1007/978-3-319-33630-5_9⟩
Conference papers
hal-01333445v1
|
||
|
fQuery: SPARQL Query Rewriting to Enforce Data ConfidentialityDBSEC 2010 : 24th annual IFIP WG 11.3 working conference on data and applications security and privacy XXIV, Jun 2010, Roma, Italy. pp.146-161, ⟨10.1007/978-3-642-13739-6_10⟩
Conference papers
hal-01056741v1
|
||
|
ELITE: zEro Links Identity managemenT systEmDBSec 2014 : 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.195-210, ⟨10.1007/978-3-662-43936-4_13⟩
Conference papers
hal-01159837v1
|
||
|
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the CloudsDBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers
hal-01159841v1
|
||
|
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.218-233, ⟨10.1007/978-3-319-18467-8_15⟩
Conference papers
hal-01152528v1
|
||
|
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.426-440, ⟨10.1007/978-3-642-36818-9_47⟩
Conference papers
hal-01213982v1
|