Search dblp for Publications

export results for "toc:db/conf/codaspy/codaspy2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/codaspy/AhmedA12,
  author       = {Musheer Ahmed and
                  Mustaque Ahamad},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Protecting health information on mobile devices},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {229--240},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133629},
  doi          = {10.1145/2133601.2133629},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/AhmedA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlmohriYK12,
  author       = {Hussain M. J. Almohri and
                  Danfeng (Daphne) Yao and
                  Dennis G. Kafura},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Identifying native applications with high assurance},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {275--282},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133635},
  doi          = {10.1145/2133601.2133635},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/AlmohriYK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ArkoudasV12,
  author       = {Konstantine Arkoudas and
                  Akshay Vashist},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {A model-theoretic approach to data anonymity and inference control},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {249--256},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133632},
  doi          = {10.1145/2133601.2133632},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ArkoudasV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ArmandoRTC12,
  author       = {Alessandro Armando and
                  Silvio Ranise and
                  Fatih Turkmen and
                  Bruno Crispo},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Efficient run-time solving of {RBAC} user authorization queries: pushing
                  the envelope},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {241--248},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133631},
  doi          = {10.1145/2133601.2133631},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ArmandoRTC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AskariSB12,
  author       = {Mina Askari and
                  Reihaneh Safavi{-}Naini and
                  Ken Barker},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {An information theoretic privacy and utility measure for data sanitization
                  mechanisms},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {283--294},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133637},
  doi          = {10.1145/2133601.2133637},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AskariSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BauerLRS12,
  author       = {Lujo Bauer and
                  Yuan Liang and
                  Michael K. Reiter and
                  Chad Spensky},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Discovering access-control misconfigurations: new approaches and evaluation
                  methodologies},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {95--104},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133613},
  doi          = {10.1145/2133601.2133613},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/BauerLRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BrunsFSH12,
  author       = {Glenn Bruns and
                  Philip W. L. Fong and
                  Ida Sri Rejeki Siahaan and
                  Michael Huth},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Relationship-based access control: its expression and enforcement
                  through hybrid logic},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {117--124},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133616},
  doi          = {10.1145/2133601.2133616},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/BrunsFSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChenL12,
  author       = {Yuxin Chen and
                  Bo Luo},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {{S2A:} secure smart household appliances},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {217--228},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133628},
  doi          = {10.1145/2133601.2133628},
  timestamp    = {Sun, 07 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChenL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChenP12,
  author       = {Xihui Chen and
                  Jun Pang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Measuring query privacy in location-based services},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133608},
  doi          = {10.1145/2133601.2133608},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChenP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/EffendyYH12,
  author       = {Suhendry Effendy and
                  Roland H. C. Yap and
                  Felix Halim},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Revisiting link privacy in social networks},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133609},
  doi          = {10.1145/2133601.2133609},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/EffendyYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GondiBVSV12,
  author       = {Kalpana Gondi and
                  Prithvi Bisht and
                  Praveen Venkatachari and
                  A. Prasad Sistla and
                  V. N. Venkatakrishnan},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {{SWIPE:} eager erasure of sensitive data in large scale systems software},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {295--306},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133638},
  doi          = {10.1145/2133601.2133638},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GondiBVSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GongYL12,
  author       = {Xi Gong and
                  Ting Yu and
                  Adam J. Lee},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Bounding trust in reputation systems with incomplete information},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {125--132},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133617},
  doi          = {10.1145/2133601.2133617},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GongYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GoodrichMOT12,
  author       = {Michael T. Goodrich and
                  Michael Mitzenmacher and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Practical oblivious storage},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133604},
  doi          = {10.1145/2133601.2133604},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GoodrichMOT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KostF12,
  author       = {Martin Kost and
                  Johann Christoph Freytag},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Privacy analysis using ontologies},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {205--216},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133627},
  doi          = {10.1145/2133601.2133627},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/KostF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KumariP12,
  author       = {Prachi Kumari and
                  Alexander Pretschner},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Deriving implementation-level policies for usage control enforcement},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133612},
  doi          = {10.1145/2133601.2133612},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/KumariP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KunduAB12,
  author       = {Ashish Kundu and
                  Mikhail J. Atallah and
                  Elisa Bertino},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Leakage-free redactable signatures},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {307--316},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133639},
  doi          = {10.1145/2133601.2133639},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/KunduAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiCB12,
  author       = {Ninghui Li and
                  Haining Chen and
                  Elisa Bertino},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {On practical specification and enforcement of obligations},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {71--82},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133611},
  doi          = {10.1145/2133601.2133611},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiYX12,
  author       = {Xiaowei Li and
                  Wei Yan and
                  Yuan Xue},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {{SENTINEL:} securing database from logic flaws in web applications},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133605},
  doi          = {10.1145/2133601.2133605},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiYX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiuW12,
  author       = {Wen Ming Liu and
                  Lingyu Wang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Privacy streamliner: a two-stage approach to improving algorithm efficiency},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {193--204},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133626},
  doi          = {10.1145/2133601.2133626},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiuW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MartinelliM12,
  author       = {Fabio Martinelli and
                  Charles Morisset},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Quantitative access control with partially-observable Markov decision
                  processes},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {169--180},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133623},
  doi          = {10.1145/2133601.2133623},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MartinelliM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MolloyDMCLR12,
  author       = {Ian M. Molloy and
                  Luke Dickens and
                  Charles Morisset and
                  Pau{-}Chen Cheng and
                  Jorge Lobo and
                  Alessandra Russo},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Risk-based security decisions under uncertainty},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133622},
  doi          = {10.1145/2133601.2133622},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/MolloyDMCLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/PontualGCKAW12,
  author       = {Murillo Pontual and
                  Andreas Gampe and
                  Omar Chowdhury and
                  Bazoumana Kone and
                  Md. Shamim Ashik and
                  William H. Winsborough},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {The privacy in the time of the internet: secrecy vs transparency},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {133--140},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133618},
  doi          = {10.1145/2133601.2133618},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/PontualGCKAW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ShiSLD12,
  author       = {Jie Shi and
                  Darren Sim and
                  Yingjiu Li and
                  Robert Huijie Deng},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {SecDS: a secure {EPC} discovery service system in EPCglobal network},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {267--274},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133634},
  doi          = {10.1145/2133601.2133634},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ShiSLD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ToubianaVC12,
  author       = {Vincent Toubiana and
                  Vincent Verdot and
                  Benoit Christophe},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Cookie-based privacy issues on google services},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {141--148},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133619},
  doi          = {10.1145/2133601.2133619},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ToubianaVC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/VerdeVAC12,
  author       = {Nino Vincenzo Verde and
                  Jaideep Vaidya and
                  Vijay Atluri and
                  Alessandro Colantonio},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Role engineering: from theory to practice},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {181--192},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133624},
  doi          = {10.1145/2133601.2133624},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/VerdeVAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/XiongZYWW12,
  author       = {Huijun Xiong and
                  Xinwen Zhang and
                  Danfeng Yao and
                  Xiaoxin Wu and
                  Yonggang Wen},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Towards end-to-end secure content storage and delivery with public
                  cloud},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {257--266},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133633},
  doi          = {10.1145/2133601.2133633},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/XiongZYWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/YangLLLL12,
  author       = {Yuhao Yang and
                  Jonathan Lutes and
                  Fengjun Li and
                  Bo Luo and
                  Peng Liu},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Stalking online: on user privacy in social networks},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133607},
  doi          = {10.1145/2133601.2133607},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/YangLLLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhaoNW12,
  author       = {Wanying Zhao and
                  Jianwei Niu and
                  William H. Winsborough},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Refinement-based design of a group-centric secure information sharing
                  model},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {149--156},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133620},
  doi          = {10.1145/2133601.2133620},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhaoNW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhengX12,
  author       = {Qingji Zheng and
                  Shouhuai Xu},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Secure and efficient proof of storage with deduplication},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133603},
  doi          = {10.1145/2133601.2133603},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhengX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhouZJN12,
  author       = {Wu Zhou and
                  Yajin Zhou and
                  Xuxian Jiang and
                  Peng Ning},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Detecting repackaged smartphone applications in third-party android
                  marketplaces},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {317--326},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133640},
  doi          = {10.1145/2133601.2133640},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhuHAYZ12,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Mengyang Yu and
                  Hong{-}Jia Zhao},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Comparison-based encryption for fine-grained access control in clouds},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133614},
  doi          = {10.1145/2133601.2133614},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhuHAYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2012,
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2133601},
  isbn         = {978-1-4503-1091-8},
  timestamp    = {Tue, 20 Mar 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics