Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/dbsec/dbsec2007.bht:"
@inproceedings{DBLP:conf/dbsec/AmanatidisBO07, author = {Georgios Amanatidis and Alexandra Boldyreva and Adam O'Neill}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Provably-Secure Schemes for Basic Query Support in Outsourced Databases}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {14--30}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_2}, doi = {10.1007/978-3-540-73538-0\_2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AmanatidisBO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ArdagnaCDVS07, author = {Claudio A. Ardagna and Marco Cremonini and Ernesto Damiani and Sabrina De Capitani di Vimercati and Pierangela Samarati}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Location Privacy Protection Through Obfuscation-Based Techniques}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {47--60}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_4}, doi = {10.1007/978-3-540-73538-0\_4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ArdagnaCDVS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriS07, author = {Vijayalakshmi Atluri and Heechang Shin}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Efficient Security Policy Enforcement in a Location Based Service Environment}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {61--76}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_5}, doi = {10.1007/978-3-540-73538-0\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BattistaP07, author = {Giuseppe Di Battista and Bernardo Palazzi}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Authenticated Relational Tables and Authenticated Skip Lists}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {31--46}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_3}, doi = {10.1007/978-3-540-73538-0\_3}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BattistaP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BertolissiFB07, author = {Clara Bertolissi and Maribel Fern{\'{a}}ndez and Steve Barker}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Dynamic Event-Based Access Control as Term Rewriting}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {195--210}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_15}, doi = {10.1007/978-3-540-73538-0\_15}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BertolissiFB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BiskupW07, author = {Joachim Biskup and Torben Weibert}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Confidentiality Policies for Controlled Query Evaluation}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {1--13}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_1}, doi = {10.1007/978-3-540-73538-0\_1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BiskupW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CanimK07, author = {Mustafa Canim and Murat Kantarcioglu}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Design and Analysis of Querying Encrypted Data in Relational Databases}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {177--194}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_14}, doi = {10.1007/978-3-540-73538-0\_14}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/CanimK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ChakrabortyPR07, author = {Sudip Chakraborty and Nayot Poolsappasit and Indrajit Ray}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {77--92}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_6}, doi = {10.1007/978-3-540-73538-0\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ChakrabortyPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CruzTY07, author = {Isabel F. Cruz and Roberto Tamassia and Danfeng Yao}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Privacy-Preserving Schema Matching Using Mutual Information}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {93--94}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_7}, doi = {10.1007/978-3-540-73538-0\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CruzTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DhankharKW07, author = {Vijayant Dhankhar and Saket Kaushik and Duminda Wijesekera}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {{XACML} Policies for Exclusive Resource Usage}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {275--290}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_20}, doi = {10.1007/978-3-540-73538-0\_20}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/DhankharKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/FernandezBDL07, author = {Eduardo B. Fern{\'{a}}ndez and Jose Ballesteros and Ana C. Desouza{-}Doucet and Maria M. Larrondo{-}Petrie}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Security Patterns for Physical Access Control Systems}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {259--274}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_19}, doi = {10.1007/978-3-540-73538-0\_19}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/FernandezBDL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JammalamadakaGMSV07, author = {Ravi Chandra Jammalamadaka and Roberto Gamboni and Sharad Mehrotra and Kent E. Seamons and Nalini Venkatasubramanian}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {gVault: {A} Gmail Based Cryptographic Network File System}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {161--176}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_13}, doi = {10.1007/978-3-540-73538-0\_13}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/JammalamadakaGMSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/KolterSP07, author = {Jan Paul Kolter and Rolf Schillinger and G{\"{u}}nther Pernul}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {A Privacy-Enhanced Attribute-Based Access Control System}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {129--143}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_11}, doi = {10.1007/978-3-540-73538-0\_11}, timestamp = {Sun, 05 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/KolterSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LayfieldKT07, author = {Ryan Layfield and Murat Kantarcioglu and Bhavani Thuraisingham}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Enforcing Honesty in Assured Information Sharing Within a Distributed System}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {113--128}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_10}, doi = {10.1007/978-3-540-73538-0\_10}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LayfieldKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayT07, author = {Indrakshi Ray and Manachai Toahchoodee}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {A Spatio-temporal Role-Based Access Control Model}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {211--226}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_16}, doi = {10.1007/978-3-540-73538-0\_16}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/RayT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangSJ07, author = {Lingyu Wang and Anoop Singhal and Sushil Jajodia}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Measuring the Overall Security of Network Configurations Using Attack Graphs}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {98--112}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_9}, doi = {10.1007/978-3-540-73538-0\_9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/XuS07, author = {Shouhuai Xu and Ravi S. Sandhu}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {A Scalable and Secure Cryptographic Service}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {144--160}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_12}, doi = {10.1007/978-3-540-73538-0\_12}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/XuS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/YangLD07, author = {Yanjiang Yang and Yingjiu Li and Robert H. Deng}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {New Paradigm of Inference Control with Trusted Computing}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {243--258}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_18}, doi = {10.1007/978-3-540-73538-0\_18}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/YangLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZhaoSZQ07, author = {Baoxian Zhao and Ravi S. Sandhu and Xinwen Zhang and Xiaolin Qin}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Towards a Times-Based Usage Control Model}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {227--242}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_17}, doi = {10.1007/978-3-540-73538-0\_17}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ZhaoSZQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZychPJ07, author = {Anna Zych and Milan Petkovic and Willem Jonker}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {95--97}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_8}, doi = {10.1007/978-3-540-73538-0\_8}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ZychPJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2007, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0}, doi = {10.1007/978-3-540-73538-0}, isbn = {978-3-540-73533-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.