Showing
1 - 20
results of
54
for search '
"Data and Applications Security XXII"
'
Skip to content
Portal K.UTB
Čeština
Login
TBU Catalog
e-resources
E-THESES
All Fields
Title
Author
Subject
Find
Advanced Search
Search Results - "Data and Applications Security XXII"
Showing
1 - 20
results of
54
for search '
"Data and Applications Security XXII"
'
, query time: 1.27s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
1
Loading…
Shared and Searchable Encrypted Data for Untrusted Servers
by
Dong, Changyu
,
Russello, Giovanni
,
Dulay, Naranker
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
2
Loading…
An Attack Graph-Based Probabilistic Security Metric
by
Wang, Lingyu
,
Islam, Tania
,
Long, Tao
,
Singhal, Anoop
,
Jajodia, Sushil
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
3
Loading…
Secure Construction of Contingency Tables from Distributed Data
by
Lu, Haibing
,
He, Xiaoyun
,
Vaidya, Jaideep
,
Adam, Nabil
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
4
Loading…
Privacy-Aware Collaborative Access Control in Web-Based Social Networks
by
Carminati, Barbara
,
Ferrari, Elena
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
5
Loading…
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services
by
Nagarajan, Aarthi
,
Varadharajan, Vijay
,
Hitchens, Michael
,
Arora, Saurabh
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
6
Loading…
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
by
Toahchoodee, Manachai
,
Ray, Indrakshi
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
7
Loading…
DIWeDa - Detecting Intrusions in Web Databases
by
Roichman, Alex
,
Gudes, Ehud
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
8
Loading…
A New Approach to Secure Logging
by
Ma, Di
,
Tsudik, Gene
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
9
Loading…
Regulating Exceptions in Healthcare Using Policy Spaces
by
Ardagna, Claudio Agostino
,
De Capitani di Vimercati, Sabrina
,
Grandison, Tyrone
,
Jajodia, Sushil
,
Samarati, Pierangela
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
10
Loading…
Sharing but Protecting Content Against Internal Leakage for Organisations
by
Alawneh, Muntaha
,
Abbadi, Imad M
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
11
Loading…
Empirical Analysis of Certificate Revocation Lists
by
Walleck, Daryl
,
Li, Yingjiu
,
Xu, Shouhuai
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
12
Loading…
Protecting the Publishing Identity in Multiple Tuples
by
Tao, Youdong
,
Tong, Yunhai
,
Tan, Shaohua
,
Tang, Shiwei
,
Yang, Dongqing
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
13
Loading…
Dynamic Meta-level Access Control in SQL
by
Barker, Steve
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
14
Loading…
P4A: A New Privacy Model for XML
by
Duta, Angela C.
,
Barker, Ken
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
15
Loading…
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
by
Zhang, Lei
,
Wang, Lingyu
,
Jajodia, Sushil
,
Brodsky, Alexander
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
16
Loading…
A Unified Audit Expression Model for Auditing SQL Queries
by
Goyal, Vikram
,
Gupta, S. K.
,
Gupta, Anand
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
17
Loading…
The Analysis of Windows Vista Disk Encryption Algorithm
by
El-Fotouh, Mohamed Abo
,
Diepold, Klaus
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
18
Loading…
Securing Workflows with XACML, RDF and BPEL
by
Dhankhar, Vijayant
,
Kaushik, Saket
,
Wijesekera, Duminda
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
19
Loading…
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
by
Ray, Indrajit
,
Poolsappasit, Nayot
,
Dewri, Rinku
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
20
Loading…
A Privacy-Preserving Ticketing System
by
Verslype, Kristof
,
De Decker, Bart
,
Naessens, Vincent
,
Nigusse, Girma
,
Lapon, Jorn
,
Verhaeghe, Pieter
Published in
Data and Applications Security XXII
Get full text
Book Chapter
Save to List
Saved in:
1
2
3
Next
[3]
RSS Feed
Email Search
Save Search
Search History
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit to articles from scholarly journals
Limit to articles with full text available
Limit to Open Access content
Exclude newspaper articles
Include articles at other libraries
Expand results using synonyms
Format
Book Chapter
53 results
53
Conference Proceeding
1 results
1
Subject Area
computer science
54 results
54
Topic
computer science
24 results
24
computer science, theory & methods
24 results
24
science & technology
24 results
24
technology
24 results
24
access control
4 results
4
access control model
4 results
4
See more
Language
English
54 results
54
Japanese
2 results
2
Year of Publication
From:
To:
Database
SpringerLink Books
29 results
29
Springer Books
29 results
29