|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 526 publication records. Showing 526 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Daniel A. Mayer, Dominik Teubert, Susanne Wetzel, Ulrike Meyer |
Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 109-120, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Keke Chen, Ramakanth Kavuluru, Shumin Guo |
RASP: efficient multidimensional range query on attack-resilient encrypted databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 249-260, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu |
The challenge of data and application security and privacy (DASPY): are we up to it. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 1-2, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | John B. Dickson |
Software security: is ok good enough? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 25-26, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dan Thomsen |
Practical policy patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 225-230, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi |
Privacy-preserving activity scheduling on mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 261-272, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lei Jin 0003, Hassan Takabi, James B. D. Joshi |
Towards active detection of identity clone attacks on online social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 27-38, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mummoorthy Murugesan, Wei Jiang, Ahmet Erhan Nergiz, Serkan Uzunbaz |
k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 169-178, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Philip W. L. Fong |
Relationship-based access control: protection model and policy language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 191-202, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bowei Xi, Murat Kantarcioglu, Ali Inan |
Mixture of gaussian models and bayes error under differential privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 179-190, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Jafari 0003, Philip W. L. Fong, Reihaneh Safavi-Naini, Ken Barker 0001, Nicholas Paul Sheppard |
Towards defining semantic foundations for purpose-based privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 213-224, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tal Malkin, Isamu Teranishi, Moti Yung |
Key dependent message security: recent results and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 3-12, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David Lorenzi, Jaideep Vaidya |
Identifying a critical threat to privacy through automatic image classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 157-168, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mauro Conti, Arbnor Hasani, Bruno Crispo |
Virtual private social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 39-50, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sonia Jahid, Carl A. Gunter, Imranul Hoque, Hamed Okhravi |
MyABDAC: compiling XACML policies for attribute-based database access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 97-108, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham |
A language for provenance access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 133-144, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marko Komlenovic, Mahesh V. Tripunitara, Toufik Zitouni |
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 121-132, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Barbara Carminati, Elena Ferrari, Sandro Morasca, Davide Taibi 0001 |
A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 51-62, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyang Sean Wang |
Panel: research agenda for data and application security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 283-284, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | You Chen, Bradley A. Malin |
Detection of anomalous insiders in collaborative environments via relational analysis of access logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 63-74, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth Brancik, Gabriel Ghinita |
The optimization of situational awareness for insider threat detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 231-236, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Junfeng Yu, Shengzhi Zhang, Peng Liu 0005, Zhitang Li |
LeakProber: a framework for profiling sensitive data leakage paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 75-84, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael S. Kirkpatrick, Sam Kerr |
Enforcing physically restricted access control for remote data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 203-212, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haifeng Qian, Shouhuai Xu |
Non-interactive editable signatures for assured data provenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 145-156, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg, N. Asokan |
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 13-24, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qingji Zheng, Shouhuai Xu |
Fair and dynamic proofs of retrievability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pp. 237-248, 2011, ACM, 978-1-4503-0466-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #526 of 526 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6] |
|