Search - IFIP Open Digital Library Access content directly

Filter your results

12 results
Structure: Internal structure identifier : 303386
Image document

Information Flow Containment: A Practical Basis for Malware Defense

R. Sekar
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.1-3, ⟨10.1007/978-3-642-22348-8_1⟩
Conference papers hal-01586591v1
Image document

Exploring Personal Computing Devices Ownership Among University Students in Indonesia

Ahmad R. Pratama
14th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2017, Yogyakarta, Indonesia. pp.835-841, ⟨10.1007/978-3-319-59111-7_70⟩
Conference papers hal-01650121v1
Image document

Uncertainty Quantification for Turbulent Mixing Flows: Rayleigh-Taylor Instability

T. Kaman , R. Kaufman , J. Glimm , D. H. Sharp
10th Working Conference on Uncertainty Quantification in Scientific Computing (WoCoUQ), Aug 2011, Boulder, CO, United States. pp.212-225, ⟨10.1007/978-3-642-32677-6_14⟩
Conference papers hal-01518667v1

Network and Parallel Computing

Guang R. Gao , Depei Qian , Xinbo Gao , Barbara Chapman , Wenguang Chen
Springer International Publishing, LNCS-9966, 2016, Lecture Notes in Computer Science, 978-3-319-47098-6. ⟨10.1007/978-3-319-47099-3⟩
Books hal-01648008v1
Image document

Algorithm Diversity for Resilient Systems

Scott D. Stoller , Yanhong A. Liu
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.359-378, ⟨10.1007/978-3-030-22479-0_19⟩
Conference papers hal-02384586v1
Image document

A Systematic Literature Review of the Relationships Between Policy Analysis and Information Technologies: Understanding and Integrating Multiple Conceptualizations

Cesar Renteria , J. Ramon Gil-Garcia
9th International Conference on Electronic Participation (ePart), Sep 2017, St. Petersburg, Russia. pp.112-124, ⟨10.1007/978-3-319-64322-9_10⟩
Conference papers hal-01703332v1
Image document

Mining Hierarchical Temporal Roles with Multiple Metrics

Scott D. Stoller , Thang Bui
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.79-95, ⟨10.1007/978-3-319-41483-6_6⟩
Conference papers hal-01633674v1
Image document

When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon’s and Naver’s Celebrity Recognition APIs

Keeyoung Kim , Simon S. Woo
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.355-369, ⟨10.1007/978-3-319-99828-2_25⟩
Conference papers hal-02023746v1
Image document

An Administrative Model for Relationship-Based Access Control

Scott D. Stoller
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.53-68, ⟨10.1007/978-3-319-20810-7_4⟩
Conference papers hal-01745824v1
Image document

Understanding Public Value Creation in the Delivery of Electronic Services

Luis F. Luna-Reyes , Rodrigo Sandoval-Almazan , Gabriel Puron-Cid , Sergio Picazo-Vela , Dolores E. Luna , et al.
16th International Conference on Electronic Government (EGOV), Sep 2017, St. Petersburg, Russia. pp.378-385, ⟨10.1007/978-3-319-64677-0_31⟩
Conference papers hal-01702999v1
Image document

Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies

Thang Bui , Scott D. Stoller , Shikhar Sharma
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.101-119, ⟨10.1007/978-3-319-61176-1_6⟩
Conference papers hal-01684356v1
Image document

Mining Attribute-Based Access Control Policies from Logs

Zhongyuan Xu , Scott D. Stoller
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩
Conference papers hal-01284862v1