Search

Your search keyword '"S., DE CAPITANI DI VIMERCATI"' showing total 42 results

Search Constraints

Start Over You searched for: Author "S., DE CAPITANI DI VIMERCATI" Remove constraint Author: "S., DE CAPITANI DI VIMERCATI"
42 results on '"S., DE CAPITANI DI VIMERCATI"'

Search Results

1. An authorization model for query execution in the cloud

2. Cloud Security

3. A privacy-aware access control system

4. XML-based access control languages

5. Managing multiple and dependable identities

6. Managing and sharing servents' reputations in P2P systems

7. [Untitled]

8. Controlling access to XML documents

9. Towards Flexible Credential Negotiation Protocols

10. On information leakage by indexes over data fragments

11. An Access Control Model for Data Archives

12. Expressive and deployable access control in open web service applications

13. Encryption-based policy enforcement for cloud storage

14. Access Control Models for XML

16. Recent Advances in Access Control

17. Privacy-enhanced Location-based Access Control

18. Access Control Policies and Languages in Open Environments

19. Location Privacy Protection Through Obfuscation-Based Techniques

21. Selective Data Encryption in Outsourced Dynamic Environments

23. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing

25. A Mobile Agent Platform for Remote Measurement

26. Enhancing User Privacy Through Data Handling Policies

27. Extending Context Descriptions in Semantics-Aware Access Control

28. Implementation of a Storage Mechanism for Untrusted DBMSs

29. Metadata Management in Outsourced Encrypted Databases

30. Advanced Metadata for Privacy-Aware Representation of Credentials

31. Key-management for multi-user encrypted databases

32. Access Control of SVG Documents

33. Designing a three-layer ontology in a Web-based interconnection scenario

34. Secure access wrapper: mediating security between heterogeneous databases

35. Measuring inference exposure in outsourced encrypted databases

36. Specification and enforcement of classification and inference constraints

37. Supporting Users in Data Outsourcing and Protection in the Cloud

38. Towards privacy-enhanced authorization policies and languages

39. Balancing confidentiality and efficiency in untrusted relational DBMSs

40. Managing privacy in LBAC systems

41. Automated derivation of global authorizations for database federations

42. Security, Privacy, and Trust in Mobile Systems and Applications

Catalog

Books, media, physical & digital resources