HiPoLDS: A Security Policy Language for Distributed Systems (English)
- New search for: Dell'Amico, Matteo
- New search for: Serme, Gabriel
- New search for: Idrees, Muhammad Sabir
- New search for: Santana de Olivera, Anderson
- New search for: Roudier, Yves
- New search for: Dell'Amico, Matteo
- New search for: Serme, Gabriel
- New search for: Idrees, Muhammad Sabir
- New search for: Santana de Olivera, Anderson
- New search for: Roudier, Yves
In:
Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP, IFIP WG 11.2 International Workshop, Information Security Theory and Practice, 6
;
97-112
;
2012
-
ISSN:
- Conference paper / Print
-
Title:HiPoLDS: A Security Policy Language for Distributed Systems
-
Contributors:Dell'Amico, Matteo ( author ) / Serme, Gabriel ( author ) / Idrees, Muhammad Sabir ( author ) / Santana de Olivera, Anderson ( author ) / Roudier, Yves ( author )
-
Published in:Lecture Notes in Computer Science ; 7322 ; 97-112
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2012
-
Size:16 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Recent Developments in Low-Level Software SecurityAgten, P. / Nikiforakis, N. / Strackx, R. / De Groef, W. / Piessens, F. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 17
-
Towards a C2I Platform for Combating the Cyber-ThreatKearney, Paul et al. | 2012
- 17
-
Towards a C^2I Platform for Combating the Cyber-Threat (Extended Abstract)Kearney, P. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 20
-
Veracity, Plausibility, and ReputationGollmann, D. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 29
-
Another Fallen Hash-Based RFID Authentication ProtocolHernandez-Castro, J.C. / Peris-Lopez, P. / Safkhani, M. / Bagheri, N. / Naderi, M. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 38
-
HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural NetworkVenkatesh, G.K. / Nadarajan, R.A. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 49
-
How to Break EAP-MD5Liu, F. / Xie, T. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 58
-
Privacy Preserving Social Network Publication on Bipartite GraphsZhou, J. / Jing, J. / Xiang, J. / Wang, L. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 71
-
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing ApplicationsChristin, D. / Lopez, P.S. / Reinhardt, A. / Hollick, M. / Kauer, M. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 87
-
Privacy Preservation of User History GraphKiyomoto, S. / Fukushima, K. / Miyake, Y. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 97
-
HiPoLDS: A Security Policy Language for Distributed SystemsDell Amico, M. / Serme, G. / Idrees, M.S. / de Olivera, A.S. / Roudier, Y. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 113
-
ROAC: A Role-Oriented Access Control ModelNassr, N. / Steegmans, E. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 128
-
Optimal Parameters for Efficient Two-Party Computation ProtocolsGanesh, C. / Rangan, C.P. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 144
-
Assisting Server for Secure Multi-Party ComputationBohli, J.-M. / Li, W. / Seedorf, J. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 160
-
An Efficient Lattice-Based Secret Sharing ConstructionEl Bansarkhani, R. / Meziani, M. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 169
-
On the Optimality of Correlation Power Attack on Embedded Cryptographic SystemsSouissi, Y. / Debande, N. / Mekki, S. / Guilley, S. / Maalaoui, A. / Danger, J.-L. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 179
-
Impossible Differential Cryptanalysis of Reduced-Round LBlockKarakoc, F. / Demirci, H. / Harmanci, A.E. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 189
-
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile DevicesGrossschadl, J. / Page, D. / Tillich, S. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 208
-
Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for AndroidSchreckling, D. / Posegga, J. / Kostler, J. / Schaff, M. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012