Filter your results
- 11
- 1
- 11
- 1
- 12
- 2
- 1
- 1
- 4
- 2
- 1
- 1
- 1
- 1
- 12
- 1
- 1
- 1
- 1
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Information Flow Containment: A Practical Basis for Malware Defense23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.1-3, ⟨10.1007/978-3-642-22348-8_1⟩
Conference papers
hal-01586591v1
|
||
|
Exploring Personal Computing Devices Ownership Among University Students in Indonesia14th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2017, Yogyakarta, Indonesia. pp.835-841, ⟨10.1007/978-3-319-59111-7_70⟩
Conference papers
hal-01650121v1
|
||
|
Uncertainty Quantification for Turbulent Mixing Flows: Rayleigh-Taylor Instability10th Working Conference on Uncertainty Quantification in Scientific Computing (WoCoUQ), Aug 2011, Boulder, CO, United States. pp.212-225, ⟨10.1007/978-3-642-32677-6_14⟩
Conference papers
hal-01518667v1
|
||
|
Network and Parallel ComputingSpringer International Publishing, LNCS-9966, 2016, Lecture Notes in Computer Science, 978-3-319-47098-6. ⟨10.1007/978-3-319-47099-3⟩
Books
hal-01648008v1
|
||
|
Algorithm Diversity for Resilient Systems33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.359-378, ⟨10.1007/978-3-030-22479-0_19⟩
Conference papers
hal-02384586v1
|
||
|
A Systematic Literature Review of the Relationships Between Policy Analysis and Information Technologies: Understanding and Integrating Multiple Conceptualizations9th International Conference on Electronic Participation (ePart), Sep 2017, St. Petersburg, Russia. pp.112-124, ⟨10.1007/978-3-319-64322-9_10⟩
Conference papers
hal-01703332v1
|
||
|
Mining Hierarchical Temporal Roles with Multiple Metrics30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.79-95, ⟨10.1007/978-3-319-41483-6_6⟩
Conference papers
hal-01633674v1
|
||
|
When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon’s and Naver’s Celebrity Recognition APIs33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.355-369, ⟨10.1007/978-3-319-99828-2_25⟩
Conference papers
hal-02023746v1
|
||
|
An Administrative Model for Relationship-Based Access Control29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.53-68, ⟨10.1007/978-3-319-20810-7_4⟩
Conference papers
hal-01745824v1
|
||
|
Understanding Public Value Creation in the Delivery of Electronic Services16th International Conference on Electronic Government (EGOV), Sep 2017, St. Petersburg, Russia. pp.378-385, ⟨10.1007/978-3-319-64677-0_31⟩
Conference papers
hal-01702999v1
|
||
|
Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.101-119, ⟨10.1007/978-3-319-61176-1_6⟩
Conference papers
hal-01684356v1
|
||
|
Mining Attribute-Based Access Control Policies from Logs28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩
Conference papers
hal-01284862v1
|