The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Confidentiality with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1985 (16) 1986-1990 (16) 1991-1994 (23) 1995-1996 (27) 1997 (20) 1998 (18) 1999 (29) 2000 (41) 2001 (40) 2002 (52) 2003 (91) 2004 (130) 2005 (176) 2006 (212) 2007 (199) 2008 (200) 2009 (167) 2010 (76) 2011 (81) 2012 (62) 2013 (59) 2014 (65) 2015 (61) 2016 (65) 2017 (58) 2018 (82) 2019 (91) 2020 (83) 2021 (93) 2022 (78) 2023 (82) 2024 (14)
Publication types (Num. hits)
article(774) incollection(28) inproceedings(1665) phdthesis(40)
Venues (Conferences, Journals, ...)
J. Priv. Confidentiality(181) CoRR(76) Privacy in Statistical Databas...(28) ARES(26) CSFW(23) ESORICS(22) DBSec(20) IACR Cryptol. ePrint Arch.(19) ACSAC(18) CCS(17) S&P(17) HICSS(16) AsiaCCS(15) ISCC(13) ITNG(12) IEEE Access(11) More (+10 of total 1048)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1928 occurrences of 929 keywords

Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Pardeep Kumar 0001, Sang il Cho, Hoon-Jae Lee 0001 PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PingPong-MAC, authentication, data integrity, stream cipher, confidentiality, ubiquitous sensor network
22Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Context-Awareness, Integrity, Confidentiality, Mandatory Access Control
22Christopher Dilloway, Gavin Lowe Specifying Secure Transport Channels. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Confidentiality and authentication, Secure transport layers, Specification, Security protocols, Secure channels
22Cédric Fournet, Tamara Rezk Cryptographically sound implementations for typed information-flow security. Search on Bibsonomy POPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF probabilistic programs, cryptography, compilers, integrity, type systems, computational model, confidentiality, non-interference, secure information flow
22Meiyappan Nagappan, Mladen A. Vouk A Model for Sharing of Confidential Provenance Information in a Query Based System. Search on Bibsonomy IPAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Workflow management tools, Confidentiality, Provenance
22Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i
22Christine M. O'Keefe, Norm M. Good A Remote Analysis Server - What Does Regression Output Look Like?. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Remote access facilities, remote server, analysis server, model server, confidentiality
22Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese Inference Control in Logic Databases as a Constraint Satisfaction Problem. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF confidentiality, constraint satisfaction problems, Inference control, constraint hierarchies, logic databases
22Lei Xia, Wei Huang, Hao Huang A Compositional Multiple Policies Operating System Security Model. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege
22Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees
22Torben Amtoft, Sruthi Bandhakavi, Anindya Banerjee 0001 A logic for information flow in object-oriented programs. Search on Bibsonomy POPL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information flow, confidentiality, aliasing
22Candelaria Hernández-Goya, Amparo Fúster-Sabater Deterministic Analysis of Balancedness in Symmetric Cryptography. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bit-string algorithm, cryptography, Confidentiality, balancedness
22Joachim Biskup, Lena Wiese On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF confidentiality of data, complete database systems, Branch and Bound, propositional logic, inference control, SAT solving, lying, Controlled Query Evaluation
22Krishnamurty Muralidhar, Rathindra Sarathy, Ramesh A. Dandekar Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy, Confidentiality, Shuffling, Swapping, Data masking
22Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta A new fair non-repudiation protocol for secure negotiation and contract signing. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange
22Amparo Fúster-Sabater, Pino Caballero-Gil A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography. Search on Bibsonomy ICCSA (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bit-string algorithm, cryptography, stream cipher, Confidentiality
22Jean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen Securing Publish/Subscribe for Multi-domain Systems. Search on Bibsonomy Middleware The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attribute encryption, message confidentiality, trust, role-based access control, publish/subscribe, content- based routing, loosely coupled applications
22Robert M. Coleman, Matthew D. Ralston, Alexander Szafran, David M. Beaulieu Multidimensional Analysis: A Management Tool for Monitoring HIPAA Compliance and Departmental Performance. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, OLAP, confidentiality, PACS, picture archiving and communications systems, HIPAA, RIS, audit logs, multidimensional analysis
22Christine M. O'Keefe, Ming Yung, Lifang Gu, Rohan A. Baxter Privacy-preserving data linkage protocols. Search on Bibsonomy WPES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy, confidentiality, data extraction, data linkage
22Ashish P. Sanil, Alan F. Karr, Xiaodong Lin 0004, Jerome P. Reiter Privacy preserving regression modelling via distributed computation. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data integration, regression, secure multi-party computation, data confidentiality
22Jun-Chou Chuang, Chin-Chen Chang 0001 Detection and Restoration of a Tampered Medical Image. Search on Bibsonomy MIAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Authentication, watermarking, medical imaging, confidentiality
22Matteo Fischetti, Juan José Salazar González Partial cell suppression: A new methodology for statistical disclosure control. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cell suppression, statistical data protection, linear programming, confidentiality, statistical disclosure control
22Vijay N. V. Kallepalli, Sylvanus A. Ehikioya, Sergio Camorlinga, Jose A. Rueda Security Middleware Infrastructure for DICOM Images in Health Information Systems. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2003 DBLP  DOI  BibTeX  RDF log maintenance, PHIA, security, privacy, access control, middleware, confidentiality, infrastructure, health care, DICOM, policy management
22Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers Secure program partitioning. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mutual distrust, distributed systems, integrity, type systems, security policies, Confidentiality, secrecy, declassification, downgrading
22Silvia Polettini, Luisa Franconi, Julian Stander Model Based Disclosure Protection. Search on Bibsonomy Inference Control in Statistical Databases The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Business microdata, protection models, confidentiality, regression models, performance assessment
22Alexander Brodsky 0001, Csilla Farkas, Sushil Jajodia Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF data-dependent disclosure, data-independent disclosure, constraints, completeness, decidability, soundness, Multilevel security, data confidentiality, inference algorithms, inference problem
22Andrew C. Myers, Barbara Liskov Protecting privacy using the decentralized label model. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF principals, integrity, policies, lattice, confidentiality, roles, type checking, information flow controls, declassification, end-to-end, downgrading
22Andrei Sabelfeld, David Sands 0001 Probabilistic Noninterference for Multi-Threaded Programs. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF probabilistic bisimulation, probabilistic scheduling, probabilistic covert channels, hook-up, type-system-based analysis, semantics, confidentiality, noninterference
22Jorge Dávila, Javier López 0001, Antonio Mana, Juan J. Ortega, José M. Troya Development of Secure Internet Applications for Governmental Environments. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure Internet applications, governmental environments, public administrative procedures, economic benefits, citizen satisfaction, Project Alcance, Spanish R&D Programme, private transport companies, Andalucia regional government, Internet, authenticity, confidentiality, public administration, nonrepudiation
22Petra Wohlmacher, Peter Pharow Applications in Health Care using Public-Key Certificates and Attribute Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures
22John Patrick McGregor, Ruby B. Lee Performance Impact of Data Compression on Virtual Private Network Transactions. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s
22Karsten Schulz, Zoran Milosevic Architecting Cross-Organisational B2B Interactions. Search on Bibsonomy EDOC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cross-organisational B2B interaction architecting, business procedures, electronic interconnectivity, workflow standards bodies, competitive edge, inter-organisational aspects, private business processes, shared business processes, interaction points, shared processes, process tasks, modelling ideas, data structures, business processes, confidentiality, workflow management systems, IT systems, process automation, process orientation, workflow management software, internal structures
22Ian T. Foster, Nicholas T. Karonis, Carl Kesselman, Greg Koenig, Steven Tuecke A Secure Communications Infrastructure for High-Performance Distributed Computing. Search on Bibsonomy HPDC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security-enhanced version, Nexus communication library, security/performance tradeoffs, authenticating, distributed computing, integrity, confidentiality, high-performance, security of data, users, resources, secure communications, security mechanisms
22T. F. Himdi, Ravi S. Sandhu Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF lattice based models, controlled sharing, confidential information, Saudi Hajj system, pilgrimage, annual event, Saudi Arabia, government ministries, trusted environment, Saudi ministries, no obligation access security, Chinese Wall security, information flow policy, interoperability, confidentiality, data sharing, security requirements, security requirement, government data processing, shared data, multi level security
22Vijay Varadharajan, Rajan Shankaran, Michael Hitchens Security services and public key infrastructure for ATM networks. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services
22Adrian Spalka The non-primitiveness of the simple-security property and its non-applicability to relational databases. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF simple-security property, secure environment, relational databases, relational databases, confidentiality, security of data
22A. W. Roscoe 0001 Intensional specifications of security protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF intensional specifications, formal specification, cryptography, security protocols, cryptographic protocols, confidentiality, access protocols
22Riccardo Focardi, Roberto Gorrieri, V. Panini The security checker: a semantics-based tool for the verification of security properties. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF security checker, semantics-based tool, security properties verification, security process algebra, concurrency workbench, formal specification, formal verification, specifications, process algebra, confidentiality, security of data, automatic verification
22Lawrence Chung, Brian A. Nixon, Eric S. K. Yu Using non-functional requirements to systematically support change. Search on Bibsonomy RE The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Barclays Bank, systematic change support, goal decomposition, goal achievement, historical record, banking policies, Barclays Bank, performance, software engineering, formal specification, software quality, evolution, systems analysis, confidentiality, system development, development process, software system, timeliness, banking, design decisions, management of change, quality requirement, nonfunctional requirements, design tradeoffs
22Jean-Charles Fabre, Tanguy Pérennou Fragmentation of confidential objects for data processing security in distributed systems. Search on Bibsonomy FTDCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF confidential objects, data processing security, untrusted shared computers, non shared trusted workstations, object fragmentation, distributed systems, distributed processing, confidentiality, security of data, object-oriented methods
22Michelle M. Hugue, Richard C. Scalzo Specifying fault tolerance in large complex computing systems. Search on Bibsonomy ICECCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF fault tolerance specification, large complex computing systems, requirements specification phase, fault hypothesis, partially correct system, system fault hypothesis, health management function, performance, real-time systems, reliability, formal specification, integrity, fault tolerant computing, software reliability, availability, safety, confidentiality, software performance evaluation, maintainability, timeliness, quality of service requirements, system behaviors, system life-cycle, dependability constraints
22Jan Schlörer Disclosure from Statistical Databases: Quantitative Aspects of Trackers. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1980 DBLP  DOI  BibTeX  RDF security, confidentiality, database security, statistical database, tracker
21Adam Barth, Collin Jackson, John C. Mitchell Securing frame communication in browsers. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Derek P. Ditch, Bruce M. McMillin The Security Implication of Multiple Observers in a Distributed System. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code dissemination protocols, sensor network security, broadcast authentication, code distribution
21Joachim Biskup, Torben Weibert Keeping secrets in incomplete databases. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Incomplete databases, Information systems, Inference control, Controlled query evaluation
21Ashish Kundu, Elisa Bertino A New Model for Secure Dissemination of XML Content. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21M. Amir Moulavi, Jalal A. Nasiri, Behnam Bahmani, Hossein Parvar, M. Sadeghizadeh, Mahmoud Naghibzadeh DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in Group Communication. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Agent, Group Communication, Bandwidth, Key Distribution, Hierarchical
21Alejandro Russo, Koen Claessen, John Hughes 0001 A library for light-weight information-flow security in haskell. Search on Bibsonomy Haskell The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information-flow, library, monad, declassification
21Ahmad Jalal, Mian Ahmad Zeb Security and QoS Optimization for Distributed Real Time Environment. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RIPEMD-160, IP Routing Protocol, Quality of Service (QoS), MARS
21M. Amir Moulavi, Hossein Parvar Agent Based Bandwidth Reduction for Key Management in Hierarchical Group Communication. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Jeffrey A. Vaughan, Steve Zdancewic A Cryptographic Decentralized Label Model. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Thomas Santen Stepwise Development of Secure Systems. Search on Bibsonomy SAFECOMP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Lantian Zheng, Andrew C. Myers End-to-End Availability Policies and Noninterference. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21David J. Power, Mark Slaymaker, Andrew C. Simpson On Deducibility and Anonymisation in Medical Databases. Search on Bibsonomy Secure Data Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Amihai Motro, Francesco Parisi-Presicce Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Daesung Moon, Yongwha Chung, Kiyoung Moon, Sung Bum Pan Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biometrics, Embedded Processors, Fingerprint Verification
21Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino, Yücel Saygin, Elena Dasseni Association Rule Hiding. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sensitive rule hiding, association rule mining, Privacy preserving data mining
21Anindya Banerjee 0001, David A. Naumann History-Based Access Control and Secure Information Flow. Search on Bibsonomy CASSIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Andrei Sabelfeld, Heiko Mantel Securing Communication in a Concurrent Language. Search on Bibsonomy SAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Giampaolo Bella Lack of Explicitness Strikes Back. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Giampaolo Bella Lack of Explicitness Strikes Back (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Chii-Hwa Lee, Min-Shiang Hwang, Wei-Pang Yang Enhanced privacy and authentication for the global system for mobile communications. Search on Bibsonomy Wirel. Networks The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
21Frédéric Cuppens, Robert Demolombe A Modal Logical Framework for Security Policies. Search on Bibsonomy ISMIS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21Marc Mehdi Ayadi, Dominique Bolignano Verification of Cryptographic Protocols: An Experiment. Search on Bibsonomy FME The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security, formal methods, cryptographic protocols, Coq
21 Data Confidentiality. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21 Confidentiality Protection. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21 Datawarehouses Confidentiality. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Adam J. Lee, Kazuhiro Minami, Nikita Borisov Confidentiality-preserving distributed proofs of conjunctive queries. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributed proof, pervasive computing, consistency
21Karim M. El Defrawy, John Solis, Gene Tsudik Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Anders Moen Hagalisletto Automated detection of confidentiality goals. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Joachim Biskup, Lena Wiese Combining Consistency and Confidentiality Requirements in First-Order Databases. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Holger Schmidt 0001 Pattern-Based Confidentiality-Preserving Refinement. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Christian J. Eibl Privacy and Confidentiality in E-Learning Systems. Search on Bibsonomy ICIW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Hui Zhang 0002, Abhishek B. Sharma, Haifeng Chen, Guofei Jiang, Xiaoqiao Meng, Kenji Yoshihira Enabling Information Confidentiality in Publish/Subscribe Overlay Services. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Jean-Marc Museux, Martine Peeters, Maria João Santos Legal, Political and Methodological Issues in Confidentiality in the European Statistical System. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Statistical Disclosure Control (SDC), access researchers microdata, tabular and micro data protection
21Lawrence H. Cox A Data Quality and Data Confidentiality Assessment of Complementary Cell Suppression. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF alternating cycle, releasing exact intervals, p/q-ambiguity rule
21Aiwu Shi, Gleb Naumovich Field Escape Analysis for Data Confidentiality in Java Components. Search on Bibsonomy APSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Gurvan Le Guernic Automaton-based Confidentiality Monitoring of Concurrent Programs. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Jamie Levy, Bilal Khan 0002 Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili Improved User Identity Confidentiality for UMTS Mobile Networks. Search on Bibsonomy ECUMN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Bhavani Thuraisingham Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Elisa Bertino, Latifur R. Khan, Ravi S. Sandhu, Bhavani Thuraisingham Secure knowledge management: confidentiality, trust, and privacy. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Christoph Sorge, Martina Zitterbart A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks. Search on Bibsonomy iTrust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Gurvan Le Guernic, Anindya Banerjee 0001, Thomas P. Jensen, David A. Schmidt Automata-Based Confidentiality Monitoring. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Barbara Carminati, Elena Ferrari Confidentiality Enforcement for XML Outsourced Data. Search on Bibsonomy EDBT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Tetsu Iwata, Kaoru Kurosawa How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Cristina L. Abad, Indranil Gupta, William Yurcik Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Susie J. Wee, John G. Apostolopoulos Secure transcoding with JPSEC confidentiality and authentication. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21John M. Abowd, Julia Lane New Approaches to Confidentiality Protection: Synthetic Data, Remote Access and Research Data Centers. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Peeter Laud Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Adrian Dobra, Alan F. Karr, Ashish P. Sanil Preserving confidentiality of high-dimensional tabulated data: Statistical and computational issues. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF marginal bounds, shuttle algorithm, integer programming, branch and bound, contingency tables, disclosure limitation
21Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov Verifying Confidentiality and Authentication in Kerberos 5. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Tetsu Iwata, Kaoru Kurosawa On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Bruce Christianson Concluding Discussion: When Does Confidentiality Harm Security? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers Untrusted Hosts and Confidentiality: Secure Program Partitioning. Search on Bibsonomy SOSP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21T. C. Ting Privacy and Confidentiality in Healthcare Delivery Information System. Search on Bibsonomy CBMS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
21MohammadMahdi Jahanara, Vahid R. Asadi, Marco Carmosino, Akbar Rafiey, Bahar Salamatian Private Boosted Decision Trees via Smooth Re-Weighting. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21John E. Marcotte, Sarah Rush, Kelly Ogden-Schuette Tiered Access to Research Data for Secondary Analysis. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 2507 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license