E-Books durchsuchen
Data and Applications Security and Privacy XXX [2016]
- 1
-
Deciphering Text from Touchscreen Key Taps
- 2
-
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem
- 3
-
Guaranteeing Correctness of Bulk Operations in Outsourced Databases
- 4
-
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols
- 5
-
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes
- 6
-
Mining Hierarchical Temporal Roles with Multiple Metrics
- 7
-
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances
- 8
-
Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS
- 9
-
A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models
- 10
-
Access Control for the Shuffle Index
- 11
-
Private and Secure Secret Shared MapReduce (Extended Abstract)
- 12
-
Towards Creating Believable Decoy Project Folders for Detecting Data Theft
- 13
-
Practical Differentially Private Modeling of Human Movement Data
- 14
-
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data
- 15
-
Data Governance and Transparency for Collaborative Systems
- 16
-
Sharing-Habits Based Privacy Control in Social Networks
- 17
-
Counteracting Active Attacks in Social Network Graphs
- 18
-
Formalizing Threat Models for Virtualized Systems
- 19
-
Reasoning About Firewall Policies Through Refinement and Composition
- 20
-
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud
- 21
-
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks
- 22
-
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems
- 23
-
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
- 24
-
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems