Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/dbsec/dbsec2009.bht:"
@inproceedings{DBLP:conf/dbsec/AutrelCC09, author = {Fabien Autrel and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Reaction Policy Model Based on Dynamic Organizations and Threat Context}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {49--64}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_4}, doi = {10.1007/978-3-642-03007-9\_4}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AutrelCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BerheDA09, author = {Solomon Berhe and Steven A. Demurjian and Thomas Agresta}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Emerging Trends in Health Care Delivery: Towards Collaborative Security for {NIST} {RBAC}}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {283--290}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_19}, doi = {10.1007/978-3-642-03007-9\_19}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BerheDA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BiskupSW09, author = {Joachim Biskup and Jens Seiler and Torben Weibert}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Controlled Query Evaluation and Inference-Free View Updates}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {1--16}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_1}, doi = {10.1007/978-3-642-03007-9\_1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BiskupSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BounaC09, author = {Bechara al Bouna and Richard Chbeir}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Detecting Inference Channels in Private Multimedia Data via Social Networks}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {208--224}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_14}, doi = {10.1007/978-3-642-03007-9\_14}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BounaC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CirianiVFJPS09, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {225--239}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_15}, doi = {10.1007/978-3-642-03007-9\_15}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/CirianiVFJPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/FoleyF09, author = {Simon N. Foley and William M. Fitzgerald}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {An Approach to Security Policy Configuration Using Semantic Threat Graphs}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {33--48}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_3}, doi = {10.1007/978-3-642-03007-9\_3}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/FoleyF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Frikken09, author = {Keith B. Frikken}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Practical Private {DNA} String Searching and Matching through Efficient Oblivious Automata Evaluation}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {81--94}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_6}, doi = {10.1007/978-3-642-03007-9\_6}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Frikken09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/GudesGG09, author = {Ehud Gudes and Nurit Gal{-}Oz and Alon Grubshtein}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Methods for Computing Trust and Reputation While Preserving Privacy}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {291--298}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_20}, doi = {10.1007/978-3-642-03007-9\_20}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/GudesGG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JurczykX09, author = {Pawel Jurczyk and Li Xiong}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {191--207}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_13}, doi = {10.1007/978-3-642-03007-9\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JurczykX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LayouniVSDV09, author = {Mohamed Layouni and Kristof Verslype and Mehmet Tahir Sandikkaya and Bart De Decker and Hans Vangheluwe}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Privacy-Preserving Telemonitoring for eHealth}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {95--110}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_7}, doi = {10.1007/978-3-642-03007-9\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LayouniVSDV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/NugmanovPH09, author = {Yermek Nugmanov and Brajendra Panda and Yi Hu}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Analysis of Data Dependency Based Intrusion Detection System}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {111--125}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_8}, doi = {10.1007/978-3-642-03007-9\_8}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/NugmanovPH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/OlsonGCW09, author = {Lars E. Olson and Carl A. Gunter and William R. Cook and Marianne Winslett}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Implementing Reflective Access Control in {SQL}}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {17--32}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_2}, doi = {10.1007/978-3-642-03007-9\_2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/OlsonGCW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Ould-SlimaneMA09, author = {Hakima Ould{-}Slimane and Mohamed Mejri and Kamel Adi}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Using Edit Automata for Rewriting-Based Security Enforcement}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {175--190}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_12}, doi = {10.1007/978-3-642-03007-9\_12}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Ould-SlimaneMA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/PietersT09, author = {Wolter Pieters and Qiang Tang}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Data Is Key: Introducing the Data-Based Access Control Paradigm}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {240--251}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_16}, doi = {10.1007/978-3-642-03007-9\_16}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/PietersT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SarrouyTJ09, author = {Olivier Sarrouy and Eric Totel and Bernard Jouga}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Building an Application Data Behavior Model for Intrusion Detection}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {299--306}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_21}, doi = {10.1007/978-3-642-03007-9\_21}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/SarrouyTJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ScalavinoGL09, author = {Enrico Scalavino and Vaibhav Gowadia and Emil C. Lupu}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {{PAES:} Policy-Based Authority Evaluation Scheme}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {268--282}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_18}, doi = {10.1007/978-3-642-03007-9\_18}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ScalavinoGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ShinA09, author = {Heechang Shin and Vijayalakshmi Atluri}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Spatiotemporal Access Control Enforcement under Uncertain Location Estimates}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {159--174}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_11}, doi = {10.1007/978-3-642-03007-9\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ShinA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SturmHS09, author = {Christoph Sturm and Ela Hunt and Marc H. Scholl}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Distributed Privilege Enforcement in {PACS}}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {142--158}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_10}, doi = {10.1007/978-3-642-03007-9\_10}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/SturmHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/TateV09, author = {Stephen R. Tate and Roopa Vishwanathan}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {252--267}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_17}, doi = {10.1007/978-3-642-03007-9\_17}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/TateV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ToahchoodeeARR09, author = {Manachai Toahchoodee and Ramadan Abdunabi and Indrakshi Ray and Indrajit Ray}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {A Trust-Based Access Control Model for Pervasive Computing Applications}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {307--314}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_22}, doi = {10.1007/978-3-642-03007-9\_22}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ToahchoodeeARR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/XuZA09, author = {Wenjuan Xu and Xinwen Zhang and Gail{-}Joon Ahn}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Towards System Integrity Protection with Graph-Based Policy Analysis}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {65--80}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_5}, doi = {10.1007/978-3-642-03007-9\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/XuZA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/YangZ09, author = {Xiaofeng Yang and Mohammad Zulkernine}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Secure Method Calls by Instrumenting Bytecode with Aspects}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {126--141}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_9}, doi = {10.1007/978-3-642-03007-9\_9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/YangZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2009, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9}, doi = {10.1007/978-3-642-03007-9}, isbn = {978-3-642-03006-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.