|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1928 occurrences of 929 keywords
|
|
|
Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
64 | Johs Hansen Hammer, Gerardo Schneider |
On the Definition and Policies of Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 337-342, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
policies, confidentiality, norms |
64 | Adeniyi Onabajo, Jens H. Jahnke |
Properties of Confidentiality Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 22-23 June 2006, Salt Lake City, Utah, USA, pp. 841-846, 2006, IEEE Computer Society, 978-0-7695-2517-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Renaud De Landtsheer, Axel van Lamsweerde |
Reasoning about confidentiality at requirements engineering time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005, Lisbon, Portugal, September 5-9, 2005, pp. 41-49, 2005, ACM, 1-59593-014-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
reasoning about confidentiality, bounded model checking, security requirements, specification patterns |
57 | Joachim Biskup, Piero A. Bonatti |
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 39-54, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Potential secret, Combined refusal and lying, Policy, Confidentiality, Inference control, Secrecy, Lying, Refusal, Controlled query evaluation |
57 | Andrei Sabelfeld |
Confidentiality for Multithreaded Programs via Bisimulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ershov Memorial Conference ![In: Perspectives of Systems Informatics, 5th International Andrei Ershov Memorial Conference, PSI 2003, Akademgorodok, Novosibirsk, Russia, July 9-12, 2003, Revised Papers, pp. 260-274, 2003, Springer, 3-540-20813-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
57 | Jim J. Longstaff, Mike A. Lockyer, John Nicholas |
The tees confidentiality model: an authorisation model for identities and roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 125-133, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Joachim Biskup, Torben Weibert |
Confidentiality Policies for Controlled Query Evaluation. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 1-13, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
confidentiality policies, Inference control, logic databases |
50 | Joachim Biskup, Jan-Hendrik Lochner |
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 407-422, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
potential secrets, Access control, relational databases, policy, information flow, confidentiality, database security, inference control |
50 | Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan 0001, Latifur Khan |
Access control, confidentiality and privacy for video surveillance databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 1-10, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
video and surveillance, privacy, access control, confidentiality |
50 | Joachim Biskup, Piero A. Bonatti |
Controlled query evaluation for enforcing confidentiality in complete information systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 3(1), pp. 14-27, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Complete information system, Confidentiality, Inference control, Lying, Refusal |
50 | Tobin Jackson, Delbert Hart |
Data decoys for confidentiality in a distributed computation: matrix multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004, pp. 307-308, 2004, ACM, 1-58113-870-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
data decoys, distributed computation, confidentiality |
50 | Seda F. Gürses, Jens H. Jahnke, Christina Obry, Adeniyi Onabajo, Thomas Santen, Morgan Price |
Eliciting confidentiality requirements in practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research, October 17-20, 2005, Toronto, Ontario, Canada, pp. 101-116, 2005, IBM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
43 | Han Tang, Bruce M. McMillin |
Security of Information Flow in the Electric Power Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 43-56, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, power grid, Cyber-physical systems |
43 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 16-34, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability |
43 | Kimberly Lochner, Stephanie Bartee, Gloria Wheatcroft, Christine Cox |
A Practical Approach to Balancing Data Confidentiality and Research Needs: The NHIS Linked Mortality Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 90-99, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
health surveys, confidentiality, record linkage, mortality |
43 | Bart Jacobs 0001, Wolter Pieters, Martijn Warnier |
Statically checking confidentiality via dynamic labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WITS ![In: Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005, pp. 50-56, 2005, ACM, 1-58113-980-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
(Higher Order) theorem proving, formal verification, static analysis, abstract interpretation, confidentiality |
43 | X. C. Dellanoy, C. Del Vigna |
Binary Integrity Constraints Against Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 7th International Conference, DEXA '96, Zurich, Switzerland, September 9-13, 1996, Proceedings, pp. 264-275, 1996, Springer, 3-540-61656-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Discretionary Models of Confidentiality, Integrity Constraints, Relational Model, Covert Channel |
43 | Xavier C. Delannoy |
Understanding the Tension between Transition Rules and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advances in Databases, 14th British National Conferenc on Databases, BNCOD 14, Edinburgh, UK, July 3-5, 1996, Proceedings, pp. 92-106, 1996, Springer, 3-540-61442-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Discretionary Models of Confidentiality, Transition Integrity Constraints, Relational Model, Covert Channel |
42 | Muhammad Adnan Tariq, Boris Koldehofe, Ala Altaweel, Kurt Rothermel |
Providing basic security mechanisms in broker-less publish/subscribe systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEBS ![In: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, DEBS 2010, Cambridge, United Kingdom, July 12-15, 2010, pp. 38-49, 2010, ACM, 978-1-60558-927-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, P2P, publish/subscribe |
42 | Baihua Zheng, Wang-Chien Lee, Peng Liu 0005, Dik Lun Lee, Xuhua Ding |
Tuning On-Air Signatures for Balancing Performance and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 21(12), pp. 1783-1797, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Adeniyi Onabajo, Jens H. Jahnke |
Modelling and Reasoning for Confidentiality Requirements in Software Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 27-30 March 2006, Potsdam, Germany, pp. 460-467, 2006, IEEE Computer Society, 0-7695-2546-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Giampaolo Bella, Stefano Bistarelli |
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers, pp. 104-119, 2002, Springer, 3-540-20830-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Johnathan M. Reason, David G. Messerschmitt |
The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMNS ![In: Management of Multimedia on the Internet, 4th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2001, Chicago, IL, USA October 29 - November 1, 2001, Proceedings, pp. 175-192, 2001, Springer, 3-540-42786-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Jim J. Longstaff, Mike A. Lockyer, M. G. Thick |
A model of accountability, confidentiality and override for healthcare and other applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 71-76, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
42 | John P. Nestor, E. S. Lee |
Prerequisite Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 282-293, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
36 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the Security of Identity Based Ring Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 310-325, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack |
36 | Oliver Jung, Christoph Ruland |
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 340-352, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
SDH/SONET, Cryptography, Encryption, Confidentiality, Modes of Operation, Broadband Networks, Self-Synchronization |
36 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei |
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 12(6), pp. 709-721, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Probabilistic authentication, Wireless sensor networks, Key management, Confidentiality, Energy saving, Information leakage |
36 | Gernot Armin Liebchen, Martin J. Shepperd |
Software Productivity Analysis of a Large Data Set and Issues of Confidentiality and Data Quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 11th IEEE International Symposium on Software Metrics (METRICS 2005), 19-22 September 2005, Como Italy, pp. 46, 2005, IEEE Computer Society, 0-7695-2371-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
confidentiality, data quality, software productivity |
36 | Mads Dam, Pablo Giambiagi |
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000, pp. 233-244, 2000, IEEE Computer Society, 0-7695-0671-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, Mobile code |
36 | Jeremy Jacob |
A Uniform Presentation of Confidentiality Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 17(11), pp. 1186-1194, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
confidentiality properties, information-flow properties, probabilistic security properties, security of data, composability, security property |
35 | Pavol Cerný, Rajeev Alur |
Automated Analysis of Java Methods for Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAV ![In: Computer Aided Verification, 21st International Conference, CAV 2009, Grenoble, France, June 26 - July 2, 2009. Proceedings, pp. 173-187, 2009, Springer, 978-3-642-02657-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Sameer Pai, Sergio A. Bermudez, Stephen B. Wicker, Marci Meingast, Tanya G. Roosta, Shankar Sastry 0001, Deirdre K. Mulligan |
Transactional Confidentiality in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(4), pp. 28-35, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin |
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: 14th International Conference on High-Performance Computer Architecture (HPCA-14 2008), 16-20 February 2008, Salt Lake City, UT, USA, pp. 161-172, 2008, IEEE Computer Society, 978-1-4244-2070-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Jun Luo 0001, Panagiotis Papadimitratos, Jean-Pierre Hubaux |
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2008, June 16-20, 2008, Crowne Plaza, San Francisco International Airport, California, USA, pp. 441-450, 2008, IEEE, 978-1-4244-1777-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Adeniyi Onabajo, Jens H. Weber-Jahnke |
Stratified Modelling and Analysis of Confidentiality Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 232, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic |
A low overhead hardware technique for software integrity and confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 25th International Conference on Computer Design, ICCD 2007, 7-10 October 2007, Lake Tahoe, CA, USA, Proceedings, pp. 113-120, 2007, IEEE, 1-4244-1258-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Thomas Santen |
A Formal Framework for Confidentiality-Preserving Refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 225-242, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi |
Attacking Confidentiality: An Agent Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 285-296, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Miguel León Chávez, Carlos Hernández Rosete, Francisco Rodríguez-Henríquez |
Achieving Confidentiality Security Service for CAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONIELECOMP ![In: 15th International Conference on Electronics, Communications, and Computers (CONIELECOMP 2005), 28 February 2005 - 2 March 2005, Puebla, Mexico, pp. 166-170, 2005, IEEE Computer Society, 0-7695-2283-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Fangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu |
Protecting integrity and confidentiality for data communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 357-362, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Thomas Santen, Maritta Heisel, Andreas Pfitzmann |
Confidentiality-Preserving Refinement is Compositional - Sometimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 194-211, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Giampaolo Bella, Stefano Bistarelli |
Soft Constraints for Security Protocol Analysis: Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADL ![In: Practical Aspects of Declarative Languages, Third International Symposium, PADL 2001, Las Vegas, Nevada, USA, March 11-12, 2001, Proceedings, pp. 108-122, 2001, Springer, 3-540-41768-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Cynthia Dwork |
The Future of the Journal of Privacy and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 8(1), 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Lars Vilhuber |
Relaunching the Journal of Privacy and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 8(1), 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Satkartar K. Kinney, Jerome P. Reiter, James O. Berger |
Model Selection when multiple imputation is used to protect confidentiality in public use data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 2(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Jennifer H. Madans |
Use of Administrative Records and the Privacy-Confidentiality Trade-off. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Kenneth Prewitt |
Why It Matters to Distinguish Between Privacy and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Gerald W. Gates |
How Uncertainty about Privacy and Confidentiality is Hampering Efforts to More Effectively Use Administrative Records in Producing U.S. National Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Stephen E. Fienberg |
Toward a Reconceptualization of Confidentiality Protection in the Context of Linkages with Administrative Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 3(2), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Avinash C. Singh |
Maintaining Analytic Utility while Protecting Confidentiality of Survey and Nonsurvey Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(2), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Satkartar K. Kinney, Alan F. Karr, Joe Fred Gonzalez Jr. |
Data Confidentiality: The Next Five Years Summary and Guide to Papers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(2), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Stephen E. Fienberg |
The Relevance or Irrelevance of Weights for Confidentiality and Statistical Analyses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(2), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Margo J. Anderson, William Seltzer |
Federal Statistical Confidentiality and Business Data: Twentieth Century Challenges and Continuing Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Priv. Confidentiality ![In: J. Priv. Confidentiality 1(1), 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Alysson Neves Bessani, Eduardo Adílio Pelinson Alchieri, Miguel Correia 0001, Joni da Silva Fraga |
DepSpace: a byzantine fault-tolerant coordination service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, pp. 163-176, 2008, ACM, 978-1-60558-013-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
confidentiality, byzantine fault tolerance, tuple space |
29 | Rita Noumeir, Alain Lemay, Jean-Marc Lina |
Pseudonymization of Radiology Data for Research Purposes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 20(3), pp. 284-295, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Research database, de-identification, nominative health care data, security, privacy, medical imaging, confidentiality, pseudonymization, radiology |
29 | Zang Li, Wenyuan Xu 0001, Robert D. Miller, Wade Trappe |
Securing wireless systems via lower layer enforcements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006, pp. 33-42, 2006, ACM, 1-59593-557-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
wireless channel estimation, authentication, confidentiality, propagation, key establishment, fading |
29 | Natalie Shlomo, Caroline Young |
Statistical Disclosure Control Methods Through a Risk-Utility Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings, pp. 68-81, 2006, Springer, 3-540-49330-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
R-U Confidentiality Map, Information loss, Disclosure risk |
29 | Joachim Biskup, Piero A. Bonatti |
Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FoIKS ![In: Foundations of Information and Knowledge Systems, 4th International Symposium, FoIKS 2006, Budapest, Hungary, February 14-17, 2006, Proceedings, pp. 43-62, 2006, Springer, 3-540-31782-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Complete information system, Open query, Safe query, Domain-independent query, Bernays-Schönfinkel class, Completeness test, Relational database, Confidentiality, First-order logic, Finite model theory, Guarded fragment, Lying, Refusal, Implication problem, Controlled query evaluation |
29 | Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez |
A parallelized way to provide data encryption and integrity checking on a processor-memory bus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 43rd Design Automation Conference, DAC 2006, San Francisco, CA, USA, July 24-28, 2006, pp. 506-509, 2006, ACM, 1-59593-381-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bus encryption, data confidentiality and integrity, architectures |
29 | Aleksandra B. Slavkovic, Stephen E. Fienberg |
Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings, pp. 30-43, 2004, Springer, 3-540-22118-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Markov bases, Linear programming, Integer programming, Confidentiality, Statistical disclosure control, Contingency tables, Tabular data |
29 | Jim Burridge |
Information preserving statistical obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 13(4), pp. 321-327, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
multivariate multiple regression model, decomposable graphical models, confidentiality, contingency tables, disclosure, data perturbation, sufficient statistics |
29 | Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran |
Responsive Security for Stored Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(9), pp. 818-828, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance |
29 | Andrei Sabelfeld, Andrew C. Myers |
A Model for Delimited Information Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers, pp. 174-191, 2003, Springer, 3-540-23635-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Computer security, information flow, security policies, confidentiality, noninterference, declassification, security-type systems |
29 | Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran |
Responsive Security for Stored Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 19-22 May 2003, Providence, RI, USA, pp. 146-154, 2003, IEEE Computer Society, 0-7695-1920-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance |
29 | Martin S. Olivier |
Database Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 4(2), pp. 20-27, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
dataveillance, integrity, availability, confidentiality, personal data, database privacy |
29 | Giampaolo Bella |
Mechanising a Protocol for Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-smart ![In: Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings, pp. 19-33, 2001, Springer, 3-540-42610-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
smart card protocols, Inductive Approach, authentication, confidentiality, key distribution |
29 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
An Analysis of Integrity Services in Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 175-187, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
representation of cryptologic goals, integrity, Confidentiality |
29 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 69-81, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
29 | Simon N. Foley, Jeremy Jacob |
Specifying security for CSCW systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 136-, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
confidentiality security, formal specification, formal specification, specification, groupware, safety, security of data, functionality, CSCW systems |
29 | Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi |
Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain MPLS Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 81-88, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
PCE, Policies, Confidentiality, XACML |
29 | Venki Balasubramanian, Doan B. Hoang, Tanveer A. Zia |
Addressing the Confidentiality and Integrity of Assistive Care Loop Framework Using Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEng ![In: 21st International Conference on Systems Engineering (ICSEng 2011), Las Vegas, NV, USA, Aug. 16-18, 2011, pp. 416-421, 2011, IEEE, 978-1-4577-1078-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Body Area Wireless Sensor Network, ACLF, Privacy, Integrity, Healthcare, Confidentiality |
29 | Aljosa Jerman-Blazic, Svetlana Saljic |
Confidentiality Labeling Using Structured Data Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 182-187, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
confidentiality label, classified data, XML, component, security domain |
29 | Wei Jiang, Wensheng Guo, Nan Sang |
Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical System in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCST ![In: Fifth International Conference on Frontier of Computer Science and Technology, FCST 2010, Changchun, Jilin Province, China, August 18-22, 2010, pp. 355-360, 2010, IEEE Computer Society, 978-0-7695-4139-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Security-critical Cyber-Physical System, Confidentiality-aware, Periodic Message scheduling, Wireless networks |
29 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Private-Key Hidden Vector Encryption with Key Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 259-277, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
private-key predicate encryption, key confidentiality |
28 | Benjamin Monate, Julien Signoles |
Slicing for Security of Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 133-142, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Sabu Emmanuel, Mohan S. Kankanhalli |
Mask-based fingerprinting scheme for digital video broadcasting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 31(2), pp. 145-170, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Video security, Video on demand, Digital watermarks, Copyright protection, MPEG-2, Video watermarking, Pay TV, Digital video broadcasting |
28 | Siu Fung Yeung, John C. S. Lui, David K. Y. Yau |
A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 7(2), pp. 330-338, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Anindya Banerjee 0001, David A. Naumann |
Using Access Control for Secure Information Flow in a Java-like Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 155-169, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Axel Schairer |
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers, pp. 101-115, 2003, Springer, 3-540-20887-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Siu Fung Yeung, John C. S. Lui, David K. Y. Yau |
A case for a multi-key secure video proxy: theory, design, and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 10th ACM International Conference on Multimedia 2002, Juan les Pins, France, December 1-6, 2002., pp. 392-401, 2002, ACM, 1-58113-620-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
asymmetric parametric sequence functions, multi-key RSA, video proxy, security |
28 | Alexander W. Dent |
A Brief History of Security Models for Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 1, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu |
Multi-agent planning with confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1275-1276, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
28 | Wai-Pun Ken Yiu, Shueng-Han Gary Chan |
Offering data confidentiality for multimedia overlay multicast: Design and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Multim. Comput. Commun. Appl. ![In: ACM Trans. Multim. Comput. Commun. Appl. 5(2), pp. 13:1-13:23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
performance analysis, Key management, overlay multicast, multicast security |
28 | Marcus Völp |
Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 268-275, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
information flow, language-based security |
28 | Taiming Feng, Chuang Wang 0002, Wensheng Zhang 0001, Lu Ruan 0001 |
Confidentiality Protection for Distributed Sensor Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 56-60, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul L. O. Re |
IT confidentiality risk assessment for an architecture-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BDIM ![In: Proceedings of BDIM 2008, 3rd IEEE/IFIP International Workshop on Business-Driven IT Management, April 7, 2008, Salvador, Brazil, pp. 31-40, 2008, IEEE, 978-1-4244-2191-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Anne Anderson |
Obligations for Privacy and Confidentiality in Distributed Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 69-81, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Ashwin Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He 0002, Min Wu 0001, Douglas W. Oard |
Confidentiality-preserving rank-ordered search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, StorageSS 2007, Alexandria, VA, USA, October 29, 2007, pp. 7-12, 2007, ACM, 978-1-59593-891-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
encrypted domain search, secure index, ranked retrieval |
28 | Guoqiang Shu, David Lee 0001 |
Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TestCom ![In: Testing of Communicating Systems, 18th IFIP TC6/WG6.1 International Conference, TestCom 2006, New York, NY, USA, May 16-18, 2006, Proceedings, pp. 357-372, 2006, Springer, 3-540-34184-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Dachuan Yu, Nayeem Islam |
A Typed Assembly Language for Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 15th European Symposium on Programming, ESOP 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 27-28, 2006, Proceedings, pp. 162-179, 2006, Springer, 3-540-33095-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Han Gao 0002, Hanne Riis Nielson |
Analysis of LYSA-calculus with explicit confidentiality annotations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 39-43, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph |
Abstractions Preserving Parameter Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 418-437, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Tetsu Iwata, Tadayoshi Kohno |
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 427-445, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Alan F. Karr, Adrian Dobra, Ashish P. Sanil |
Table servers protect confidentiality in tabular data releases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 46(1), pp. 57-58, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Maritta Heisel, Andreas Pfitzmann, Thomas Santen |
Confidentiality-Preserving Refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 295-306, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer |
Authentication and Confidentiality via IPSEC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings, pp. 255-272, 2000, Springer, 3-540-41031-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Claude Crépeau |
A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 239-247, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
22 | Pierangela Samarati, Sabrina De Capitani di Vimercati |
Data protection in outsourcing scenarios: issues and directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 1-14, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, access control, encryption, confidentiality, data protection, data outsourcing, data fragmentation |
22 | Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal |
MPLS security: an approach for unicast and multicast environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 64(5-6), pp. 391-400, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Threshold secret sharing scheme, Security, Confidentiality, MPLS |
Displaying result #1 - #100 of 2507 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|