|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 526 publication records. Showing 526 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Daniel A. Mayer, Dominik Teubert, Susanne Wetzel, Ulrike Meyer |
Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Keke Chen, Ramakanth Kavuluru, Shumin Guo |
RASP: efficient multidimensional range query on attack-resilient encrypted databases. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu |
The challenge of data and application security and privacy (DASPY): are we up to it. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | John B. Dickson |
Software security: is ok good enough? |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dan Thomsen |
Practical policy patterns. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi |
Privacy-preserving activity scheduling on mobile devices. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lei Jin 0003, Hassan Takabi, James B. D. Joshi |
Towards active detection of identity clone attacks on online social networks. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mummoorthy Murugesan, Wei Jiang, Ahmet Erhan Nergiz, Serkan Uzunbaz |
k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Philip W. L. Fong |
Relationship-based access control: protection model and policy language. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bowei Xi, Murat Kantarcioglu, Ali Inan |
Mixture of gaussian models and bayes error under differential privacy. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Jafari 0003, Philip W. L. Fong, Reihaneh Safavi-Naini, Ken Barker 0001, Nicholas Paul Sheppard |
Towards defining semantic foundations for purpose-based privacy policies. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tal Malkin, Isamu Teranishi, Moti Yung |
Key dependent message security: recent results and applications. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David Lorenzi, Jaideep Vaidya |
Identifying a critical threat to privacy through automatic image classification. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mauro Conti, Arbnor Hasani, Bruno Crispo |
Virtual private social networks. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sonia Jahid, Carl A. Gunter, Imranul Hoque, Hamed Okhravi |
MyABDAC: compiling XACML policies for attribute-based database access control. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham |
A language for provenance access control. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marko Komlenovic, Mahesh V. Tripunitara, Toufik Zitouni |
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC). |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Barbara Carminati, Elena Ferrari, Sandro Morasca, Davide Taibi 0001 |
A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyang Sean Wang |
Panel: research agenda for data and application security. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | You Chen, Bradley A. Malin |
Detection of anomalous insiders in collaborative environments via relational analysis of access logs. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth Brancik, Gabriel Ghinita |
The optimization of situational awareness for insider threat detection. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Junfeng Yu, Shengzhi Zhang, Peng Liu 0005, Zhitang Li |
LeakProber: a framework for profiling sensitive data leakage paths. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael S. Kirkpatrick, Sam Kerr |
Enforcing physically restricted access control for remote data. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haifeng Qian, Shouhuai Xu |
Non-interactive editable signatures for assured data provenance. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg, N. Asokan |
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qingji Zheng, Shouhuai Xu |
Fair and dynamic proofs of retrievability. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #526 of 526 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6] |
|