The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CODASPY"( http://dblp.L3S.de/Venues/CODASPY )

URL (DBLP): http://dblp.uni-trier.de/db/conf/codaspy

Publication years (Num. hits)
2011 (29) 2012 (32) 2013 (43) 2014 (44) 2015 (43) 2016 (41) 2017 (43) 2018 (48) 2019 (36) 2020 (45) 2021 (41) 2022 (48) 2023 (33)
Publication types (Num. hits)
inproceedings(513) proceedings(13)
Venues (Conferences, Journals, ...)
CODASPY(526)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 526 publication records. Showing 526 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Daniel A. Mayer, Dominik Teubert, Susanne Wetzel, Ulrike Meyer Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Keke Chen, Ramakanth Kavuluru, Shumin Guo RASP: efficient multidimensional range query on attack-resilient encrypted databases. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu The challenge of data and application security and privacy (DASPY): are we up to it. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1John B. Dickson Software security: is ok good enough? Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dan Thomsen Practical policy patterns. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi Privacy-preserving activity scheduling on mobile devices. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lei Jin 0003, Hassan Takabi, James B. D. Joshi Towards active detection of identity clone attacks on online social networks. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mummoorthy Murugesan, Wei Jiang, Ahmet Erhan Nergiz, Serkan Uzunbaz k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Philip W. L. Fong Relationship-based access control: protection model and policy language. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bowei Xi, Murat Kantarcioglu, Ali Inan Mixture of gaussian models and bayes error under differential privacy. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohammad Jafari 0003, Philip W. L. Fong, Reihaneh Safavi-Naini, Ken Barker 0001, Nicholas Paul Sheppard Towards defining semantic foundations for purpose-based privacy policies. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tal Malkin, Isamu Teranishi, Moti Yung Key dependent message security: recent results and applications. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David Lorenzi, Jaideep Vaidya Identifying a critical threat to privacy through automatic image classification. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mauro Conti, Arbnor Hasani, Bruno Crispo Virtual private social networks. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sonia Jahid, Carl A. Gunter, Imranul Hoque, Hamed Okhravi MyABDAC: compiling XACML policies for attribute-based database access control. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham A language for provenance access control. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marko Komlenovic, Mahesh V. Tripunitara, Toufik Zitouni An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC). Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Barbara Carminati, Elena Ferrari, Sandro Morasca, Davide Taibi 0001 A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xiaoyang Sean Wang Panel: research agenda for data and application security. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1You Chen, Bradley A. Malin Detection of anomalous insiders in collaborative environments via relational analysis of access logs. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kenneth Brancik, Gabriel Ghinita The optimization of situational awareness for insider threat detection. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Junfeng Yu, Shengzhi Zhang, Peng Liu 0005, Zhitang Li LeakProber: a framework for profiling sensitive data leakage paths. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael S. Kirkpatrick, Sam Kerr Enforcing physically restricted access control for remote data. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Haifeng Qian, Shouhuai Xu Non-interactive editable signatures for assured data provenance. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg, N. Asokan Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qingji Zheng, Shouhuai Xu Fair and dynamic proofs of retrievability. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #526 of 526 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license