Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2017
- Aysajan Abidin, Enrique Argones-Rúa, Roel Peeters:
Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication. SACMAT 2017: 21-29 - Seyed Hossein Ahmadinejad, Philip W. L. Fong:
An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms. SACMAT 2017: 55-66 - James Alderman, Jason Crampton, Naomi Farley:
A Framework for the Cryptographic Enforcement of Information Flow Policies. SACMAT 2017: 143-154 - Thang Bui, Scott D. Stoller, Jiajie Li:
Mining Relationship-Based Access Control Policies. SACMAT 2017: 239-246 - Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino:
Distributed Intelligence: Trends in the Management of Complex Systems. SACMAT 2017: 1-7 - Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
On the Satisfiability of Workflows with Release Points. SACMAT 2017: 207-217 - Jason Crampton, Conrad Williams:
Attribute Expressions, Policy Tables and Attribute-Based Access Control. SACMAT 2017: 79-90 - Mayank Gautam, Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Poster: Constrained Policy Mining in Attribute Based Access Control. SACMAT 2017: 121-123 - Paolo Guarda, Silvio Ranise, Hari Siswantoro:
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems. SACMAT 2017: 247-254 - Maanak Gupta, Farhan Patwa, James O. Benson, Ravi S. Sandhu:
Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment. SACMAT 2017: 183-190 - Maanak Gupta, Farhan Patwa, Ravi S. Sandhu:
POSTER: Access Control Model for the Hadoop Ecosystem. SACMAT 2017: 125-127 - Syed Kamran Haider, Hamza Omar, Ilia A. Lebedev, Srinivas Devadas, Marten van Dijk:
Leveraging Hardware Isolation for Process Level Access Control & Authentication. SACMAT 2017: 133-141 - Claiborne Johnson, Thomas MacGahan, John Heaps, Kevin Baldor, Jeffery von Ronne, Jianwei Niu:
Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures. SACMAT 2017: 167-178 - Erisa Karafili, Emil C. Lupu:
Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis. SACMAT 2017: 231-238 - Sanghak Lee, Jiwon Choi, Jihun Kim, Beumjin Cho, Sangho Lee, Hanjun Kim, Jong Kim:
FACT: Functionality-centric Access Control System for IoT Programming Frameworks. SACMAT 2017: 43-54 - Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, Ruby B. Lee:
Secure Pick Up: Implicit Authentication When You Start Using the Smartphone. SACMAT 2017: 67-78 - Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. SACMAT 2017: 129-131 - Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke, Edgar R. Weippl:
Poster: Design of an Anomaly-based Threat Detection & Explication System. SACMAT 2017: 119-120 - Thomas MacGahan, Claiborne Johnson, Armando Rodriguez, Jeffery von Ronne, Jianwei Niu:
Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language. SACMAT 2017: 191-198 - Shagufta Mehnaz, Gowtham Bellala, Elisa Bertino:
A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics. SACMAT 2017: 219-230 - Masoud Narouei, Hamed Khanpour, Hassan Takabi, Natalie Parde, Rodney D. Nielsen:
Towards a Top-down Policy Engineering Framework for Attribute-based Access Control. SACMAT 2017: 103-114 - Edelmira Pasarella, Jorge Lobo:
A Datalog Framework for Modeling Relationship-based Access Control Policies. SACMAT 2017: 91-102 - Giuseppe Petracca, Frank Capobianco, Christian Skalka, Trent Jaeger:
On Risk in Access Control Enforcement. SACMAT 2017: 31-42 - Ehood Porat, Shmuel Tikochinski, Ariel Stulman:
Authorization Enforcement Detection. SACMAT 2017: 179-182 - Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records. SACMAT 2017: 255-262 - Rodney Rodriguez, Shaikh Mostafa, Xiaoyin Wang:
NTApps: A Network Traffic Analyzer of Android Applications. SACMAT 2017: 199-206 - Douglas Steiert, Dan Lin, Quincy Conduff, Wei Jiang:
Poster: A Location-Privacy Approach for Continuous Queries. SACMAT 2017: 115-117 - Qais Tasali, Chandan Chowdhury, Eugene Y. Vasserman:
A Flexible Authorization Architecture for Systems of Interoperable Medical Devices. SACMAT 2017: 9-20 - Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn:
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. SACMAT 2017: 155-166 - Elisa Bertino, Ravi S. Sandhu, Edgar R. Weippl:
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017. ACM 2017, ISBN 978-1-4503-4702-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-06 07:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint