Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/codaspy/codaspy2012.bht:"
@inproceedings{DBLP:conf/codaspy/AhmedA12, author = {Musheer Ahmed and Mustaque Ahamad}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Protecting health information on mobile devices}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {229--240}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133629}, doi = {10.1145/2133601.2133629}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/AhmedA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AlmohriYK12, author = {Hussain M. J. Almohri and Danfeng (Daphne) Yao and Dennis G. Kafura}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Identifying native applications with high assurance}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {275--282}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133635}, doi = {10.1145/2133601.2133635}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/AlmohriYK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ArkoudasV12, author = {Konstantine Arkoudas and Akshay Vashist}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {A model-theoretic approach to data anonymity and inference control}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {249--256}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133632}, doi = {10.1145/2133601.2133632}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ArkoudasV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ArmandoRTC12, author = {Alessandro Armando and Silvio Ranise and Fatih Turkmen and Bruno Crispo}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Efficient run-time solving of {RBAC} user authorization queries: pushing the envelope}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {241--248}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133631}, doi = {10.1145/2133601.2133631}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ArmandoRTC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AskariSB12, author = {Mina Askari and Reihaneh Safavi{-}Naini and Ken Barker}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {An information theoretic privacy and utility measure for data sanitization mechanisms}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {283--294}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133637}, doi = {10.1145/2133601.2133637}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AskariSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BauerLRS12, author = {Lujo Bauer and Yuan Liang and Michael K. Reiter and Chad Spensky}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Discovering access-control misconfigurations: new approaches and evaluation methodologies}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {95--104}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133613}, doi = {10.1145/2133601.2133613}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/BauerLRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BrunsFSH12, author = {Glenn Bruns and Philip W. L. Fong and Ida Sri Rejeki Siahaan and Michael Huth}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Relationship-based access control: its expression and enforcement through hybrid logic}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {117--124}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133616}, doi = {10.1145/2133601.2133616}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/BrunsFSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChenL12, author = {Yuxin Chen and Bo Luo}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {{S2A:} secure smart household appliances}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {217--228}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133628}, doi = {10.1145/2133601.2133628}, timestamp = {Sun, 07 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ChenL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChenP12, author = {Xihui Chen and Jun Pang}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Measuring query privacy in location-based services}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {49--60}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133608}, doi = {10.1145/2133601.2133608}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ChenP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/EffendyYH12, author = {Suhendry Effendy and Roland H. C. Yap and Felix Halim}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Revisiting link privacy in social networks}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {61--70}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133609}, doi = {10.1145/2133601.2133609}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/EffendyYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GondiBVSV12, author = {Kalpana Gondi and Prithvi Bisht and Praveen Venkatachari and A. Prasad Sistla and V. N. Venkatakrishnan}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {{SWIPE:} eager erasure of sensitive data in large scale systems software}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {295--306}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133638}, doi = {10.1145/2133601.2133638}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/GondiBVSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GongYL12, author = {Xi Gong and Ting Yu and Adam J. Lee}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Bounding trust in reputation systems with incomplete information}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {125--132}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133617}, doi = {10.1145/2133601.2133617}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GongYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GoodrichMOT12, author = {Michael T. Goodrich and Michael Mitzenmacher and Olga Ohrimenko and Roberto Tamassia}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Practical oblivious storage}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {13--24}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133604}, doi = {10.1145/2133601.2133604}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GoodrichMOT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KostF12, author = {Martin Kost and Johann Christoph Freytag}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Privacy analysis using ontologies}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {205--216}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133627}, doi = {10.1145/2133601.2133627}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/KostF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KumariP12, author = {Prachi Kumari and Alexander Pretschner}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Deriving implementation-level policies for usage control enforcement}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {83--94}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133612}, doi = {10.1145/2133601.2133612}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/KumariP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KunduAB12, author = {Ashish Kundu and Mikhail J. Atallah and Elisa Bertino}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Leakage-free redactable signatures}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {307--316}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133639}, doi = {10.1145/2133601.2133639}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/KunduAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiCB12, author = {Ninghui Li and Haining Chen and Elisa Bertino}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {On practical specification and enforcement of obligations}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {71--82}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133611}, doi = {10.1145/2133601.2133611}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/LiCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiYX12, author = {Xiaowei Li and Wei Yan and Yuan Xue}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {{SENTINEL:} securing database from logic flaws in web applications}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {25--36}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133605}, doi = {10.1145/2133601.2133605}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/LiYX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiuW12, author = {Wen Ming Liu and Lingyu Wang}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Privacy streamliner: a two-stage approach to improving algorithm efficiency}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {193--204}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133626}, doi = {10.1145/2133601.2133626}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/LiuW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MartinelliM12, author = {Fabio Martinelli and Charles Morisset}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Quantitative access control with partially-observable Markov decision processes}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {169--180}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133623}, doi = {10.1145/2133601.2133623}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MartinelliM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MolloyDMCLR12, author = {Ian M. Molloy and Luke Dickens and Charles Morisset and Pau{-}Chen Cheng and Jorge Lobo and Alessandra Russo}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Risk-based security decisions under uncertainty}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {157--168}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133622}, doi = {10.1145/2133601.2133622}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/MolloyDMCLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/PontualGCKAW12, author = {Murillo Pontual and Andreas Gampe and Omar Chowdhury and Bazoumana Kone and Md. Shamim Ashik and William H. Winsborough}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {The privacy in the time of the internet: secrecy vs transparency}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {133--140}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133618}, doi = {10.1145/2133601.2133618}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/PontualGCKAW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ShiSLD12, author = {Jie Shi and Darren Sim and Yingjiu Li and Robert Huijie Deng}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {SecDS: a secure {EPC} discovery service system in EPCglobal network}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {267--274}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133634}, doi = {10.1145/2133601.2133634}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ShiSLD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ToubianaVC12, author = {Vincent Toubiana and Vincent Verdot and Benoit Christophe}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Cookie-based privacy issues on google services}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {141--148}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133619}, doi = {10.1145/2133601.2133619}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ToubianaVC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/VerdeVAC12, author = {Nino Vincenzo Verde and Jaideep Vaidya and Vijay Atluri and Alessandro Colantonio}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Role engineering: from theory to practice}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {181--192}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133624}, doi = {10.1145/2133601.2133624}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/VerdeVAC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/XiongZYWW12, author = {Huijun Xiong and Xinwen Zhang and Danfeng Yao and Xiaoxin Wu and Yonggang Wen}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Towards end-to-end secure content storage and delivery with public cloud}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {257--266}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133633}, doi = {10.1145/2133601.2133633}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/XiongZYWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/YangLLLL12, author = {Yuhao Yang and Jonathan Lutes and Fengjun Li and Bo Luo and Peng Liu}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Stalking online: on user privacy in social networks}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {37--48}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133607}, doi = {10.1145/2133601.2133607}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/YangLLLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhaoNW12, author = {Wanying Zhao and Jianwei Niu and William H. Winsborough}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Refinement-based design of a group-centric secure information sharing model}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {149--156}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133620}, doi = {10.1145/2133601.2133620}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhaoNW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhengX12, author = {Qingji Zheng and Shouhuai Xu}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Secure and efficient proof of storage with deduplication}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {1--12}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133603}, doi = {10.1145/2133601.2133603}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhengX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhouZJN12, author = {Wu Zhou and Yajin Zhou and Xuxian Jiang and Peng Ning}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Detecting repackaged smartphone applications in third-party android marketplaces}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {317--326}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133640}, doi = {10.1145/2133601.2133640}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhuHAYZ12, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Mengyang Yu and Hong{-}Jia Zhao}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Comparison-based encryption for fine-grained access control in clouds}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {105--116}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133614}, doi = {10.1145/2133601.2133614}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZhuHAYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2012, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2133601}, isbn = {978-1-4503-1091-8}, timestamp = {Tue, 20 Mar 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.