The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for confidentiality with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1985 (16) 1986-1990 (16) 1991-1994 (22) 1995-1996 (27) 1997 (17) 1998 (18) 1999 (27) 2000 (42) 2001 (40) 2002 (52) 2003 (90) 2004 (129) 2005 (176) 2006 (210) 2007 (200) 2008 (199) 2009 (158) 2010 (56) 2011 (57) 2012 (52) 2013 (48) 2014 (52) 2015 (55) 2016 (47) 2017 (55) 2018 (53) 2019 (9)
Publication types (Num. hits)
article(368) incollection(22) inproceedings(1512) phdthesis(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1929 occurrences of 929 keywords

Results
Found 1923 publication records. Showing 1923 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
69Adeniyi Onabajo, Jens H. Jahnke Properties of Confidentiality Requirements. Search on Bibsonomy CBMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
68Johs Hansen Hammer, Gerardo Schneider On the Definition and Policies of Confidentiality. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF policies, confidentiality, norms
61Jim J. Longstaff, Mike A. Lockyer, John Nicholas The tees confidentiality model: an authorisation model for identities and roles. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
61Andrei Sabelfeld Confidentiality for Multithreaded Programs via Bisimulation. Search on Bibsonomy Ershov Memorial Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
60Renaud De Landtsheer, Axel van Lamsweerde Reasoning about confidentiality at requirements engineering time. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF reasoning about confidentiality, bounded model checking, security requirements, specification patterns
60Joachim Biskup, Piero A. Bonatti Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Potential secret, Combined refusal and lying, Policy, Confidentiality, Inference control, Secrecy, Lying, Refusal, Controlled query evaluation
53Seda F. Gürses, Jens H. Jahnke, Christina Obry, Adeniyi Onabajo, Thomas Santen, Morgan Price Eliciting confidentiality requirements in practice. Search on Bibsonomy CASCON The full citation details ... 2005 DBLP  BibTeX  RDF
52Joachim Biskup, Jan-Hendrik Lochner Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF potential secrets, Access control, relational databases, policy, information flow, confidentiality, database security, inference control
52Joachim Biskup, Torben Weibert Confidentiality Policies for Controlled Query Evaluation. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF confidentiality policies, Inference control, logic databases
52Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan 0001, Latifur Khan Access control, confidentiality and privacy for video surveillance databases. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF video and surveillance, privacy, access control, confidentiality
52Joachim Biskup, Piero A. Bonatti Controlled query evaluation for enforcing confidentiality in complete information systems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Complete information system, Confidentiality, Inference control, Lying, Refusal
52Tobin Jackson, Delbert Hart Data decoys for confidentiality in a distributed computation: matrix multiplication. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data decoys, distributed computation, confidentiality
47Muhammad Adnan Tariq, Boris Koldehofe, Ala Altaweel, Kurt Rothermel Providing basic security mechanisms in broker-less publish/subscribe systems. Search on Bibsonomy DEBS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, P2P, publish/subscribe
46Han Tang, Bruce M. McMillin Security of Information Flow in the Electric Power Grid. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information flow, confidentiality, power grid, Cyber-physical systems
46Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability
45Baihua Zheng, Wang-Chien Lee, Peng Liu, Dik Lun Lee, Xuhua Ding Tuning On-Air Signatures for Balancing Performance and Confidentiality. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
45Adeniyi Onabajo, Jens H. Jahnke Modelling and Reasoning for Confidentiality Requirements in Software Development. Search on Bibsonomy ECBS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Giampaolo Bella, Stefano Bistarelli Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Johnathan M. Reason, David G. Messerschmitt The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks. Search on Bibsonomy MMNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Jim J. Longstaff, Mike A. Lockyer, M. G. Thick A model of accountability, confidentiality and override for healthcare and other applications. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
45John P. Nestor, E. S. Lee Prerequisite Confidentiality. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
45Kimberly Lochner, Stephanie Bartee, Gloria Wheatcroft, Christine Cox A Practical Approach to Balancing Data Confidentiality and Research Needs: The NHIS Linked Mortality Files. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF health surveys, confidentiality, record linkage, mortality
45Bart Jacobs 0001, Wolter Pieters, Martijn Warnier Statically checking confidentiality via dynamic labels. Search on Bibsonomy WITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF (Higher Order) theorem proving, formal verification, static analysis, abstract interpretation, confidentiality
45Xavier C. Delannoy Understanding the Tension between Transition Rules and Confidentiality. Search on Bibsonomy BNCOD The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Discretionary Models of Confidentiality, Transition Integrity Constraints, Relational Model, Covert Channel
45X. C. Dellanoy, C. Del Vigna Binary Integrity Constraints Against Confidentiality. Search on Bibsonomy DEXA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Discretionary Models of Confidentiality, Integrity Constraints, Relational Model, Covert Channel
38S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan On the Security of Identity Based Ring Signcryption Schemes. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack
38Oliver Jung, Christoph Ruland Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF SDH/SONET, Cryptography, Encryption, Confidentiality, Modes of Operation, Broadband Networks, Self-Synchronization
38Pavol Cerný, Rajeev Alur Automated Analysis of Java Methods for Confidentiality. Search on Bibsonomy CAV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Sameer Pai, Sergio Bermudez, Stephen B. Wicker, Marci Meingast, Tanya Roosta, Shankar Sastry, Deirdre K. Mulligan Transactional Confidentiality in Sensor Networks. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin Single-level integrity and confidentiality protection for distributed shared memory multiprocessors. Search on Bibsonomy HPCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Adeniyi Onabajo, Jens H. Weber-Jahnke Stratified Modelling and Analysis of Confidentiality Requirements. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Jun Luo, Panagiotis Papadimitratos, Jean-Pierre Hubaux GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries. Search on Bibsonomy SECON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic A low overhead hardware technique for software integrity and confidentiality. Search on Bibsonomy ICCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi Attacking Confidentiality: An Agent Based Approach. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Thomas Santen A Formal Framework for Confidentiality-Preserving Refinement. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Miguel León Chávez, Carlos Hernández Rosete, Francisco Rodríguez-Henríquez Achieving Confidentiality Security Service for CAN. Search on Bibsonomy CONIELECOMP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Fangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu Protecting integrity and confidentiality for data communication. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Thomas Santen, Maritta Heisel, Andreas Pfitzmann Confidentiality-Preserving Refinement is Compositional - Sometimes. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
38Giampaolo Bella, Stefano Bistarelli Soft Constraints for Security Protocol Analysis: Confidentiality. Search on Bibsonomy PADL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Search on Bibsonomy Wireless Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Probabilistic authentication, Wireless sensor networks, Key management, Confidentiality, Energy saving, Information leakage
37Gernot Armin Liebchen, Martin J. Shepperd Software Productivity Analysis of a Large Data Set and Issues of Confidentiality and Data Quality. Search on Bibsonomy IEEE METRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF confidentiality, data quality, software productivity
37Mads Dam, Pablo Giambiagi Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF information flow, confidentiality, Mobile code
37Jeremy Jacob A Uniform Presentation of Confidentiality Properties. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF confidentiality properties, information-flow properties, probabilistic security properties, security of data, composability, security property
31Benjamin Monate, Julien Signoles Slicing for Security of Code. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Sabu Emmanuel, Mohan S. Kankanhalli Mask-based fingerprinting scheme for digital video broadcasting. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Video security, Video on demand, Digital watermarks, Copyright protection, MPEG-2, Video watermarking, Pay TV, Digital video broadcasting
31Siu F. Yeung, John C. S. Lui, David K. Y. Yau A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation. Search on Bibsonomy IEEE Trans. Multimedia The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Anindya Banerjee 0001, David A. Naumann Using Access Control for Secure Information Flow in a Java-like Language. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Axel Schairer Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Siu F. Yeung, John C. S. Lui, David K. Y. Yau A case for a multi-key secure video proxy: theory, design, and implementation. Search on Bibsonomy ACM Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF asymmetric parametric sequence functions, multi-key RSA, video proxy, security
30Alysson Neves Bessani, Eduardo Adílio Pelinson Alchieri, Miguel Correia 0001, Joni da Silva Fraga DepSpace: a byzantine fault-tolerant coordination service. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF confidentiality, byzantine fault tolerance, tuple space
30Rita Noumeir, Alain Lemay, Jean-Marc Lina Pseudonymization of Radiology Data for Research Purposes. Search on Bibsonomy J. Digital Imaging The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Research database, de-identification, nominative health care data, security, privacy, medical imaging, confidentiality, pseudonymization, radiology
30Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez A parallelized way to provide data encryption and integrity checking on a processor-memory bus. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bus encryption, data confidentiality and integrity, architectures
30Zang Li, Wenyuan Xu, Robert D. Miller, Wade Trappe Securing wireless systems via lower layer enforcements. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless channel estimation, authentication, confidentiality, propagation, key establishment, fading
30Natalie Shlomo, Caroline Young Statistical Disclosure Control Methods Through a Risk-Utility Framework. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF R-U Confidentiality Map, Information loss, Disclosure risk
30Joachim Biskup, Piero A. Bonatti Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. Search on Bibsonomy FoIKS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Complete information system, Open query, Safe query, Domain-independent query, Bernays-Schönfinkel class, Completeness test, Relational database, Confidentiality, First-order logic, Finite model theory, Guarded fragment, Lying, Refusal, Implication problem, Controlled query evaluation
30Aleksandra B. Slavkovic, Stephen E. Fienberg Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Markov bases, Linear programming, Integer programming, Confidentiality, Statistical disclosure control, Contingency tables, Tabular data
30Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran Responsive Security for Stored Data. Search on Bibsonomy IEEE Trans. Parallel Distrib. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance
30Jim Burridge Information preserving statistical obfuscation. Search on Bibsonomy Statistics and Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF multivariate multiple regression model, decomposable graphical models, confidentiality, contingency tables, disclosure, data perturbation, sufficient statistics
30Andrei Sabelfeld, Andrew C. Myers A Model for Delimited Information Release. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computer security, information flow, security policies, confidentiality, noninterference, declassification, security-type systems
30Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran Responsive Security for Stored Data. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance
30Martin S. Olivier Database Privacy. Search on Bibsonomy SIGKDD Explorations The full citation details ... 2002 DBLP  DOI  BibTeX  RDF dataveillance, integrity, availability, confidentiality, personal data, database privacy
30Giampaolo Bella Mechanising a Protocol for Smart Cards. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart card protocols, Inductive Approach, authentication, confidentiality, key distribution
30Kapali Viswanathan, Colin Boyd, Ed Dawson An Analysis of Integrity Services in Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF representation of cryptologic goals, integrity, Confidentiality
30Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
30Simon N. Foley, Jeremy Jacob Specifying security for CSCW systems. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF confidentiality security, formal specification, formal specification, specification, groupware, safety, security of data, functionality, CSCW systems
30Alexander W. Dent A Brief History of Security Models for Confidentiality. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu Multi-agent planning with confidentiality. Search on Bibsonomy AAMAS (2) The full citation details ... 2009 DBLP  BibTeX  RDF
30Wai-Pun Ken Yiu, Shueng-Han Gary Chan Offering data confidentiality for multimedia overlay multicast: Design and analysis. Search on Bibsonomy TOMCCAP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF performance analysis, Key management, overlay multicast, multicast security
30Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul L. O. Re IT confidentiality risk assessment for an architecture-based approach. Search on Bibsonomy BDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Taiming Feng, Chuang Wang 0002, Wensheng Zhang 0001, Lu Ruan 0001 Confidentiality Protection for Distributed Sensor Data Aggregation. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Marcus Völp Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information flow, language-based security
30Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Anne Anderson Obligations for Privacy and Confidentiality in Distributed Transactions. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Ashwin Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He 0002, Min Wu 0001, Douglas W. Oard Confidentiality-preserving rank-ordered search. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encrypted domain search, secure index, ranked retrieval
30Han Gao, Hanne Riis Nielson Analysis of LYSA-calculus with explicit confidentiality annotations. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Guoqiang Shu, David Lee Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. Search on Bibsonomy TestCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Dachuan Yu, Nayeem Islam A Typed Assembly Language for Confidentiality. Search on Bibsonomy ESOP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph Abstractions Preserving Parameter Confidentiality. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Tetsu Iwata, Tadayoshi Kohno New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Alan F. Karr, Adrian Dobra, Ashish P. Sanil Table servers protect confidentiality in tabular data releases. Search on Bibsonomy Commun. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Maritta Heisel, Andreas Pfitzmann, Thomas Santen Confidentiality-Preserving Refinement. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
30Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer Authentication and Confidentiality via IPSEC. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
30Claude Crépeau A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
29Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain MPLS Networks. Search on Bibsonomy POLICY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF PCE, Policies, Confidentiality, XACML
29Venki Balasubramanian, Doan B. Hoang, Tanveer A. Zia Addressing the Confidentiality and Integrity of Assistive Care Loop Framework Using Wireless Sensor Networks. Search on Bibsonomy ICSEng The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Body Area Wireless Sensor Network, ACLF, Privacy, Integrity, Healthcare, Confidentiality
29Wei Jiang, Wensheng Guo, Nan Sang Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical System in Wireless Networks. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Security-critical Cyber-Physical System, Confidentiality-aware, Periodic Message scheduling, Wireless networks
29Aljosa Jerman-Blazic, Svetlana Saljic Confidentiality Labeling Using Structured Data Types. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF confidentiality label, classified data, XML, component, security domain
29Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Private-Key Hidden Vector Encryption with Key Confidentiality. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private-key predicate encryption, key confidentiality
23Adam Barth, Collin Jackson, John C. Mitchell Securing frame communication in browsers. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Derek P. Ditch, Bruce M. McMillin The Security Implication of Multiple Observers in a Distributed System. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code dissemination protocols, sensor network security, broadcast authentication, code distribution
23Ashish Kundu, Elisa Bertino A New Model for Secure Dissemination of XML Content. Search on Bibsonomy IEEE Trans. Systems, Man, and Cybernetics, Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Joachim Biskup, Torben Weibert Keeping secrets in incomplete databases. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Incomplete databases, Information systems, Inference control, Controlled query evaluation
23Alejandro Russo, Koen Claessen, John Hughes A library for light-weight information-flow security in haskell. Search on Bibsonomy Haskell The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information-flow, library, monad, declassification
23M. Amir Moulavi, Jalal A. Nasiri, Behnam Bahmani, Hossein Parvar, M. Sadeghizadeh, Mahmoud Naghibzadeh DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in Group Communication. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Agent, Group Communication, Bandwidth, Key Distribution, Hierarchical
23M. Amir Moulavi, Hossein Parvar Agent Based Bandwidth Reduction for Key Management in Hierarchical Group Communication. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23A. Jalal, Mian Ahmad Zeb Security and QoS Optimization for Distributed Real Time Environment. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RIPEMD-160, IP Routing Protocol, Quality of Service (QoS), MARS
23Jeffrey A. Vaughan, Steve Zdancewic A Cryptographic Decentralized Label Model. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Thomas Santen Stepwise Development of Secure Systems. Search on Bibsonomy SAFECOMP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Lantian Zheng, Andrew C. Myers End-to-End Availability Policies and Noninterference. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23David J. Power, Mark Slaymaker, Andrew C. Simpson On Deducibility and Anonymisation in Medical Databases. Search on Bibsonomy Secure Data Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1923 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license