Filter your results
- 7
- 7
- 7
- 1
- 2
- 1
- 2
- 1
- 7
- 2
- 1
- 7
- 6
- 4
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Migrating from DAC to RBAC29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.69-84, ⟨10.1007/978-3-319-20810-7_5⟩
Conference papers
hal-01745820v1
|
||
|
Privacy-Preserving Subgraph Discovery26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.161-176, ⟨10.1007/978-3-642-31540-4_13⟩
Conference papers
hal-01534763v1
|
||
|
Role Mining under Role-Usage Cardinality Constraint27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.150-161, ⟨10.1007/978-3-642-30436-1_13⟩
Conference papers
hal-01518246v1
|
||
|
Enhancing the Security of Image CAPTCHAs Through Noise Addition30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.354-368, ⟨10.1007/978-3-319-18467-8_24⟩
Conference papers
hal-01345127v1
|
||
|
Preventing Unauthorized Data Flows31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.41-62, ⟨10.1007/978-3-319-61176-1_3⟩
Conference papers
hal-01684345v1
|
||
|
Analysis of TRBAC with Dynamic Temporal Role Hierarchies27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.297-304, ⟨10.1007/978-3-642-39256-6_22⟩
Conference papers
hal-01490714v1
|
||
|
An Optimization Model for the Extended Role Mining Problem23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.76-89, ⟨10.1007/978-3-642-22348-8_8⟩
Conference papers
hal-01586595v1
|