Search dblp for Publications

export results for "toc:db/conf/dbsec/dbsec2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dbsec/BiskupP13,
  author       = {Joachim Biskup and
                  Marcel Preu{\ss}},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Database Fragmentation with Encryption: Under Which Semantic Constraints
                  and {A} Priori Knowledge Can Two Keep a Secret?},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_2},
  doi          = {10.1007/978-3-642-39256-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BiskupP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BounaCM13,
  author       = {Bechara al Bouna and
                  Chris Clifton and
                  Qutaibah M. Malluhi},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Using Safety Constraint for Transactional Dataset Anonymization},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {164--178},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_11},
  doi          = {10.1007/978-3-642-39256-6\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BounaCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DongCCR13,
  author       = {Changyu Dong and
                  Liqun Chen and
                  Jan Camenisch and
                  Giovanni Russello},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Fair Private Set Intersection with a Semi-trusted Arbiter},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {128--144},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_9},
  doi          = {10.1007/978-3-642-39256-6\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/DongCCR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DongLW13,
  author       = {Boxiang Dong and
                  Ruilin Liu and
                  Wendy Hui Wang},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Result Integrity Verification of Outsourced Frequent Itemset Mining},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {258--265},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_17},
  doi          = {10.1007/978-3-642-39256-6\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/DongLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/FanXS13,
  author       = {Liyue Fan and
                  Li Xiong and
                  Vaidy S. Sunderam},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Differentially Private Multi-dimensional Time Series Release for Traffic
                  Monitoring},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_3},
  doi          = {10.1007/978-3-642-39256-6\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/FanXS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JainP13,
  author       = {Rohit Jain and
                  Sunil Prabhakar},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Access Control and Query Verification for Untrusted Databases},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {211--225},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_14},
  doi          = {10.1007/978-3-642-39256-6\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JainP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JustusCCBCC13,
  author       = {Benjamin Justus and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Olivier Cipiere},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer
                  Size Standard for the Setbase},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {274--281},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_19},
  doi          = {10.1007/978-3-642-39256-6\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JustusCCBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KerschbaumHGKSST13,
  author       = {Florian Kerschbaum and
                  Martin H{\"{a}}rterich and
                  Patrick Grofig and
                  Mathias Kohler and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Optimal Re-encryption Strategy for Joins in Encrypted Databases},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_13},
  doi          = {10.1007/978-3-642-39256-6\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/KerschbaumHGKSST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KikuchiS13,
  author       = {Hiroaki Kikuchi and
                  Jun Sakuma},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size
                  of an Intersection},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {145--163},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_10},
  doi          = {10.1007/978-3-642-39256-6\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/KikuchiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LeKJ13,
  author       = {Meixing Le and
                  Krishna Kant and
                  Sushil Jajodia},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Rule Enforcement with Third Parties in Secure Cooperative Data Access},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {282--288},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_20},
  doi          = {10.1007/978-3-642-39256-6\_20},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LeKJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LuHYDB13,
  author       = {Haibing Lu and
                  Yuan Hong and
                  Yanjiang Yang and
                  Lian Duan and
                  Nazia Badar},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Towards User-Oriented {RBAC} Model},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {81--96},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_6},
  doi          = {10.1007/978-3-642-39256-6\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LuHYDB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MitraSAV13,
  author       = {Barsha Mitra and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Toward Mining of Temporal Roles},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_5},
  doi          = {10.1007/978-3-642-39256-6\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MitraSAV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/PetrlicS13,
  author       = {Ronald Petrlic and
                  Stephan Sekula},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Unlinkable Content Playbacks in a Multiparty {DRM} System},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {289--296},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_21},
  doi          = {10.1007/978-3-642-39256-6\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/PetrlicS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayMRH13,
  author       = {Indrajit Ray and
                  Dieudonne Mulamba and
                  Indrakshi Ray and
                  Keesook J. Han},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {A Model for Trust-Based Access Control and Delegation in Mobile Clouds},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {242--257},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_16},
  doi          = {10.1007/978-3-642-39256-6\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayMRH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ThorpeRGBF13,
  author       = {Sean S. E. Thorpe and
                  Indrajit Ray and
                  Tyrone Grandison and
                  Abbie Barbir and
                  Robert B. France},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence
                  for Forensic Cloud Investigations},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_7},
  doi          = {10.1007/978-3-642-39256-6\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ThorpeRGBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/TranSS13,
  author       = {Le Minh Sang Tran and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {An Approach to Select Cost-Effective Risk Countermeasures},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {266--273},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_18},
  doi          = {10.1007/978-3-642-39256-6\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/TranSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/UzunAVS13,
  author       = {Emre Uzun and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Analysis of {TRBAC} with Dynamic Temporal Role Hierarchies},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {297--304},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_22},
  doi          = {10.1007/978-3-642-39256-6\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/UzunAVS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VimercatiFJLPS13,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Extending Loose Associations to Multiple Fragments},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_1},
  doi          = {10.1007/978-3-642-39256-6\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/VimercatiFJLPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangSJJ13,
  author       = {Zhan Wang and
                  Kun Sun and
                  Sushil Jajodia and
                  Jiwu Jing},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {TerraCheck: Verification of Dedicated Cloud Storage},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_8},
  doi          = {10.1007/978-3-642-39256-6\_8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangSJJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangZSM13,
  author       = {Yang Wang and
                  Jun Zheng and
                  Chen Sun and
                  Srinivas Mukkamala},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Quantitative Security Risk Assessment of Android Permissions and Applications},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {226--241},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_15},
  doi          = {10.1007/978-3-642-39256-6\_15},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangZSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/YangGY13,
  author       = {Ping Yang and
                  Mikhail I. Gofman and
                  Zijiang Yang},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Policy Analysis for Administrative Role Based Access Control without
                  Separate Administration},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_4},
  doi          = {10.1007/978-3-642-39256-6\_4},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/YangGY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Yavuz13,
  author       = {Attila Altay Yavuz},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Practical Immutable Signature Bouquets {(PISB)} for Authentication
                  and Integrity in Outsourced Databases},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_12},
  doi          = {10.1007/978-3-642-39256-6\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Yavuz13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2013,
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6},
  doi          = {10.1007/978-3-642-39256-6},
  isbn         = {978-3-642-39255-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics