Filter your results
- 3
- 3
- 3
- 1
- 1
- 1
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
From MDM to DB2: A Case Study of Security Enforcement Migration26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers
hal-01534771v1
|
||
|
Reconstructing Interactions with Rich Internet Applications from HTTP Traces12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.147-164, ⟨10.1007/978-3-319-46279-0_8⟩
Conference papers
hal-01758682v1
|
||
|
Designing Process Architectures for User Engagement with Enterprise Cognitive Systems10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.141-155, ⟨10.1007/978-3-319-70241-4_10⟩
Conference papers
hal-01765247v1
|