τ-safety: A privacy model for sequential publication with arbitrary updates (Englisch)
- Neue Suche nach: Anjum, Adeel
- Neue Suche nach: Anjum, Adeel
- Neue Suche nach: Raschia, Guillaume
- Neue Suche nach: Gelgon, Marc
- Neue Suche nach: Khan, Abid
- Neue Suche nach: Malik, Saif ur Rehman
- Neue Suche nach: Ahmad, Naveed
- Neue Suche nach: Ahmed, Mansoor
- Neue Suche nach: Suhail, Sabah
- Neue Suche nach: Alam, M. Masoom
In:
Computers & security
;
66
; 20-39
;
2017
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:τ-safety: A privacy model for sequential publication with arbitrary updates
-
Beteiligte:Anjum, Adeel ( Autor:in ) / Raschia, Guillaume / Gelgon, Marc / Khan, Abid / Malik, Saif ur Rehman / Ahmad, Naveed / Ahmed, Mansoor / Suhail, Sabah / Alam, M. Masoom
-
Erschienen in:Computers & security ; 66 ; 20-39
-
Verlag:
- Neue Suche nach: Elsevier
-
Erscheinungsort:Kidlington, Oxford
-
Erscheinungsdatum:2017
-
ISSN:
-
ZDBID:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Inhaltsverzeichnis – Band 66
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Quality of Private Information (QoPI) model for effective representation and prediction of privacy controls in mobile computingKim, Seung-Hyun / Ko, In-Young / Kim, Soo-Hyung et al. | 2017
- 20
-
τ-safety: A privacy model for sequential publication with arbitrary updatesAnjum, Adeel / Raschia, Guillaume / Gelgon, Marc / Khan, Abid / Malik, Saif ur Rehman / Ahmad, Naveed / Ahmed, Mansoor / Suhail, Sabah / Alam, M. Masoom et al. | 2016
- 20
-
[tau]-safety: A privacy model for sequential publication with arbitrary updatesAdeel Anjum et al. | 2017
- 20
-
I"-safety: A privacy model for sequential publication with arbitrary updates| 2017
- 40
-
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studiesParsons, Kathryn / Calic, Dragana / Pattinson, Malcolm / Butavicius, Marcus / McCormac, Agata / Zwaans, Tara et al. | 2017
- 40
-
The Human Aspects of Information Security Questionaire (HAIS-Q): Two further validation studiesKathryn Parsons et al. | 2017
- 52
-
An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspectiveHan, JinYoung / Kim, Yoo Jung / Kim, Hyungjin et al. | 2016
- 66
-
Approaches to analyze cyber terrorist communities: Survey and challengesSaidi, Firas / Trabelsi, Zouheir / Salah, Khaled / Ghezala, Henda Ben et al. | 2016
- 81
-
Why a counterfeit risk avoidance strategy failsMiyamoto, Inez / Holzer, Thomas H. / Sarkani, Shahryar et al. | 2016
- 97
-
Reverse engineering a Java Card memory management algorithmMesbah, Abdelhak / Lanet, Jean-Louis / Mezghiche, Mohamed et al. | 2017
- 115
-
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devicesNguyen, Toan Van / Sae-Bae, Napa / Memon, Nasir et al. | 2017
- 129
-
Familiarity with Internet threats: Beyond awarenessJeske, Debora / van Schaik, Paul et al. | 2017
- 142
-
A forensic insight into Windows 10 Cortana searchSingh, Bhupendra / Singh, Upasna et al. | 2017
- 155
-
On designing a modified-UI based honeyword generation approach for overcoming the existing limitationsChakraborty, Nilesh / Mondal, Samrat et al. | 2017
- 169
-
Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff processRazaque, Abdul / Rizvi, Syed S. / Khan, Meer J. / Hani, Qassim B. / Dichter, Julius P. / Parizi, Reza M. et al. | 2017
- 185
-
Formal analysis of XACML policies using SMTTurkmen, Fatih / den Hartog, Jerry / Ranise, Silvio / Zannone, Nicola et al. | 2017
- 204
-
Full autonomy: A novel individualized anonymity model for privacy preservingLe, Junqing / Liao, Xiaofeng / Yang, Bo et al. | 2016
- 218
-
Privilege or procedure: Evaluating the effect of employee status on intent to comply with socially interactive information security threats and controlsAurigemma, Salvatore / Mattson, Thomas et al. | 2017
- CO2
-
IFC - Editorial Board| 2017
- iii
-
Contents| 2017