Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality (English)
Free access
- New search for: Kurek, Tytus
- New search for: Niemiec, Marcin
- New search for: Lason, Artur
- New search for: Kurek, Tytus
- New search for: Niemiec, Marcin
- New search for: Lason, Artur
In:
International Journal of Information Security
;
15
, 3
;
235-250
;
2015
- Article (Journal) / Electronic Resource
-
Title:Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality
-
Contributors:
-
Published in:International Journal of Information Security ; 15, 3 ; 235-250
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin/Heidelberg
-
Publication date:2015-05-26
-
Size:16 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 15, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 225
-
Understanding trust in privacy-aware video surveillance systemsRashwan, Hatem A. / Solanas, Agusti / Puig, Domènec / Martínez-Ballesté, Antoni et al. | 2015
- 235
-
Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentialityKurek, Tytus / Niemiec, Marcin / Lason, Artur et al. | 2015
- 251
-
Multi-Keyword search over encrypted data with scoring and search pattern obfuscationOrencik, Cengiz / Selcuk, Ayse / Savas, Erkay / Kantarcioglu, Murat et al. | 2015
- 271
-
Broadcast encryption with dealershipGritti, Clémentine / Susilo, Willy / Plantard, Thomas / Liang, Kaitai / Wong, Duncan S. et al. | 2015
- 285
-
Efficient parallelizable hashing using small non-compressing primitivesMennink, Bart / Preneel, Bart et al. | 2015
- 301
-
Detection of firewall configuration errors with updatable treeAbbes, Tarek / Bouhoula, Adel / Rusinowitch, Michaël et al. | 2015
- 319
-
Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systemsSalini, P. / Kanmani, S. et al. | 2015