The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "DBSec"( http://dblp.L3S.de/Venues/DBSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/dbsec

Publication years (Num. hits)
1987 (22) 1988 (20) 1989 (28) 1990 (28) 1991 (21) 1992 (26) 1993 (21) 1994 (28) 1995 (25) 1996 (20) 1997 (25) 1998 (19) 1999 (22) 2000 (35) 2001 (24) 2002 (26) 2003 (29) 2004 (27) 2005 (26) 2006 (23) 2007 (21) 2008 (26) 2009 (23) 2010 (30) 2011 (27) 2012 (25) 2013 (23) 2014 (27) 2015 (25) 2016 (25) 2017 (31) 2018 (22) 2019 (22) 2020 (23) 2021 (24) 2022 (19) 2023 (25)
Publication types (Num. hits)
inproceedings(876) proceedings(37)
Venues (Conferences, Journals, ...)
DBSec(913)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 78 occurrences of 64 keywords

Results
Found 913 publication records. Showing 913 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati Location Privacy Protection Through Obfuscation-Based Techniques. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Steve Barker, Gail-Joon Ahn (eds.) Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Clara Bertolissi, Maribel Fernández, Steve Barker Dynamic Event-Based Access Control as Term Rewriting. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jan Paul Kolter, Rolf Schillinger, Günther Pernul A Privacy-Enhanced Attribute-Based Access Control System. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera XACML Policies for Exclusive Resource Usage. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham Enforcing Honesty in Assured Information Sharing Within a Distributed System. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Indrakshi Ray, Manachai Toahchoodee A Spatio-temporal Role-Based Access Control Model. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian gVault: A Gmail Based Cryptographic Network File System. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie Security Patterns for Physical Access Control Systems. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF physical access control, security, access control, software patterns, intelligent buildings
1Joachim Biskup, Torben Weibert Confidentiality Policies for Controlled Query Evaluation. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF confidentiality policies, Inference control, logic databases
1Vijayalakshmi Atluri, Heechang Shin Efficient Security Policy Enforcement in a Location Based Service Environment. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Measuring the Overall Security of Network Configurations Using Attack Graphs. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Isabel F. Cruz, Roberto Tamassia, Danfeng Yao Privacy-Preserving Schema Matching Using Mutual Information. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mustafa Canim, Murat Kantarcioglu Design and Analysis of Querying Encrypted Data in Relational Databases. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill Provably-Secure Schemes for Basic Query Support in Outsourced Databases. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Anna Zych, Milan Petkovic, Willem Jonker The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yanjiang Yang, Yingjiu Li, Robert H. Deng New Paradigm of Inference Control with Trusted Computing. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security protocol, trusted computing, auditing, Inference control
1Julien Lafaye, David Gross-Amblard XML Streams Watermarking. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Lingyu Wang 0001, Chao Yao, Anoop Singhal, Sushil Jajodia Interactive Analysis of Attack Graphs Using Relational Queries. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Geri Georg, Siv Hilde Houmb, Indrakshi Ray Aspect-Oriented Risk Driven Development of Secure Applications. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Vijayalakshmi Atluri, Heechang Shin Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jason Crampton Discretionary and Mandatory Controls for Role-Based Administration. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati Enhancing User Privacy Through Data Handling Policies. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Indrajit Ray, Sudip Chakraborty A Framework for Flexible Access Control in Digital Library Systems. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Philip Robinson, Florian Kerschbaum, Andreas Schaad From Business Process Choreography to Authorization Policies. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Einar Mykletun, Gene Tsudik Aggregation Queries in the Database-As-a-Service Model. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nicola Zannone, Sushil Jajodia, Duminda Wijesekera Creating Objects in the Flexible Authorization Framework. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan Authenticating Multi-dimensional Query Results in Data Publishing. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Lena Wiese On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF confidentiality of data, complete database systems, Branch and Bound, propositional logic, inference control, SAT solving, lying, Controlled Query Evaluation
1Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe Authrule: A Generic Rule-Based Authorization Module. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael T. Goodrich, Roberto Tamassia, Danfeng Yao Notarized Federated Identity Management for Web Services. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Da-Wei Wang 0004, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu Information Theoretical Analysis of Two-Party Secret Computation. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy Analysis, Scalar Product, Private Computation
1Ernesto Damiani, Peng Liu (eds.) Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Martin Wimmer 0001, Alfons Kemper, Maarten Rits, Volkmar Lotz Consolidating the Access Control of Composite Applications and Workflows. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nataliya Rassadko Policy Classes and Query Rewriting Algorithm for XML Security Views. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Security, Security Policy, Firewalls, Anomalies, Packet Filters
1Noa Tuval, Ehud Gudes Resolving Information Flow Conflicts in RBAC Systems. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF role graph consistency, canonical groups, Role based access control
1Steve Barker, Maribel Fernández Term Rewriting for Access Control. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yi-Ting Chiang, Da-Wei Wang 0004, Churn-Jung Liau, Tsan-sheng Hsu Secrecy of Two-Party Secure Computation. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Privacy Analysis, Scalar Product, Private Computation
1Sushil Jajodia, Duminda Wijesekera (eds.) Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kun Bai, Alex Hai Wang, Peng Liu 0005 Towards Database Firewalls. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Guang-Lei Song, Kang Zhang 0001, Bhavani Thuraisingham, Jun Kong Secure Model Management Operations for the Web. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joon S. Park, Harish S. Krishnan Trusted Identity and Session Management Using Secure Cookies. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF .NET Passport, Identity Management, Cookies
1Sarath Indrakanti, Vijay Varadharajan An Authorization Architecture for Web Services. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Inja Youn, Csilla Farkas, Bhavani Thuraisingham Multilevel Secure Teleconferencing over Public Switched Telephone Network. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray Security Vulnerabilities in Software Systems: A Quantitative Perspective. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Alex X. Liu, Mohamed G. Gouda Complete Redundancy Detection in Firewalls. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Redundant Rules, Network Security, Firewall
1Murat Kantarcioglu, Chris Clifton Security Issues in Querying Encrypted Data. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Glen Nuckolls Verified Query Results from Hybrid Authentication Trees. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert Trading Off Security in a Service Oriented Architecture. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jun Li, Edward Omiecinski Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati Towards Privacy-Enhanced Authorization Policies and Languages. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes Designing Secure Indexes for Encrypted Databases. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Andreas Schaad Revocation of Obligation and Authorisation Policy Objects. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting Role Slices: A Notation for RBAC Permission Assignment and Enforcement. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Amihai Motro, Francesco Parisi-Presicce Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Adrian Spalka, Jan Lehnhardt A Comprehensive Approach to Anomaly Detection in Relational Databases. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF relational databases, anomaly detection, Database security, misuse detection
1Justin Zhijun Zhan, Stan Matwin, LiWu Chang Privacy-Preserving Collaborative Association Rule Mining. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, Privacy, association rule mining
1Joachim Biskup, Barbara Sprick, Lena Wiese Secure Mediation with Mobile Code. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Wei Jiang, Chris Clifton Privacy-Preserving Distributed k-Anonymity. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, privacy, k-anonymity
1Jaideep Vaidya, Chris Clifton Privacy-Preserving Decision Trees over Vertically Partitioned Data. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Theodore Johnson, S. Muthukrishnan 0001, Oliver Spatscheck, Divesh Srivastava Streams, Security and Scalability. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tai Xin, Yajie Zhu, Indrakshi Ray Reliable Scheduling of Advanced Transactions. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Csilla Farkas, Pierangela Samarati (eds.) Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  BibTeX  RDF
1Ravi Mukkamala, L. Chekuri, Mohammed A. Moharrum, S. Palley Policy-based Security Management for Enterprise Systems. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Steve Barker Web Resource Usage Control in RSCLP. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mei Ge, Sylvia L. Osborn A Design for Parameterized Roles. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ladislav Huraj, Helmut Reiser Efficient Verification of Delegation in Distributed Group Membership Management. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Vijayalakshmi Atluri, Qi Guo STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Emmanuel D. Pontikakis, Achilleas A. Tsitsonis, Vassilios S. Verykios An Experimental Study of Distortion-Based Techniques for Association Rule Hiding. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Hakan Hacigümüs, Sharad Mehrotra Performance-Conscious Key Management in Encrypted Databases. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Indrakshi Ray, Tai Xin Implementing Real-Time Update of Access Control Policies. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce Information Flow Analysis for File Systems and Databases Using Labels. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ernesto Damiani, Sabrina De Capitani di Vimercati Invited Talk - Towards Semantics-Aware Access Control. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Indrajit Ray, Tomas Hajek Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Aybar C. Acar, Amihai Motro Why Is this User Asking so Many Questions? Explaining Sequences of Queries. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Andreas Schaad An Extended Analysis of Delegating Obligations. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Inja Youn, Duminda Wijesekera Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Lawrence H. Cox Invited Talk - Inference Control Problems in Statistical Database Query Systems. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray (eds.) Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  BibTeX  RDF
1Da-Wei Wang 0004, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen On The Damage and Compensation of Privacy Leakage. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Torben Weibert Refusal in Incomplete Databases. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Justin Zhijun Zhan, LiWu Chang, Stan Matwin Privacy-Preserving Multi-Party Decision Tree Induction. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting RBAC/MAC Security Analysis and Design for UML. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yanjun Zuo, Brajendra Panda Damage Discovery in Distributed Database Systems. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul A Pattern System for Access Control. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yingjiu Li, Vipin Swarup, Sushil Jajodia Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jaehong Park, Xinwen Zhang, Ravi S. Sandhu Attribute Mutability in Usage Control. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart Configuring Storage Area Networks for Mandatory Security. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Joon S. Park, Abhishek Jain A Framework for Trusted Wireless Sensor Networks. Search on Bibsonomy DBSec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Steve Barker, Paul Douglas RBAC Policy Implementation for SQL Databases. Search on Bibsonomy DBSec The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi Remote Computer Fingerprinting for Cyber Crime Investigations. Search on Bibsonomy DBSec The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi Secure Authorisation for Web Services. Search on Bibsonomy DBSec The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jong P. Yoon High-speed Access Control for XML Documents. Search on Bibsonomy DBSec The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Marco Cremonini, Ernesto Damiani, Pierangela Samarati Semantics-Aware Perimeter Protection. Search on Bibsonomy DBSec The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1David W. Chadwick, Edward Ball 0002, M. V. Sahalayev Modifying LDAP to Support PKI. Search on Bibsonomy DBSec The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 913 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license