Nome |
# |
Cloud Security: Issues and Concerns, file dfa8b996-0c70-748b-e053-3a05fe0a3a96
|
1738
|
Location privacy protection through obfuscation-based techniques, file dfa8b990-e52b-748b-e053-3a05fe0a3a96
|
842
|
Access control for smarter healthcare using policy spaces, file dfa8b98f-9556-748b-e053-3a05fe0a3a96
|
821
|
Protecting data in outsourcing scenarios, file dfa8b98f-9cd9-748b-e053-3a05fe0a3a96
|
664
|
Data security issues in cloud scenarios, file dfa8b995-94f6-748b-e053-3a05fe0a3a96
|
389
|
PrimeLife policy language, file dfa8b98f-7692-748b-e053-3a05fe0a3a96
|
365
|
Minimising disclosure of client information in credential-based interactions, file dfa8b98f-b2f5-748b-e053-3a05fe0a3a96
|
363
|
Towards privacy-aware identity management, file dfa8b98e-9855-748b-e053-3a05fe0a3a96
|
319
|
Data Security and Privacy in the Cloud, file dfa8b99e-4c72-748b-e053-3a05fe0a3a96
|
289
|
Practical techniques building on encryption for protecting and managing data in the Cloud, file dfa8b995-5666-748b-e053-3a05fe0a3a96
|
273
|
Securing Resources in Decentralized Cloud Storage, file dfa8b99e-4feb-748b-e053-3a05fe0a3a96
|
271
|
Supporting Application Requirements in Cloud-based IoT Information Processing, file dfa8b995-e0b5-748b-e053-3a05fe0a3a96
|
249
|
An Authorization Model for Multi-Provider Queries, file dfa8b99a-31ce-748b-e053-3a05fe0a3a96
|
246
|
Enforcing authorizations while protecting access confidentiality, file dfa8b99a-1536-748b-e053-3a05fe0a3a96
|
245
|
Three-server swapping for access confidentiality, file dfa8b995-3dc5-748b-e053-3a05fe0a3a96
|
239
|
Confidentiality Protection in Large Databases, file dfa8b998-9c1f-748b-e053-3a05fe0a3a96
|
234
|
Minimizing disclosure of private information in credential-based interactions : a graph-based approach, file dfa8b98f-9655-748b-e053-3a05fe0a3a96
|
232
|
Managing data sharing in OpenStack Swift with Over-Encryption, file dfa8b996-e848-748b-e053-3a05fe0a3a96
|
224
|
A dynamic tree-based data structure for access privacy in the cloud, file dfa8b998-5cb9-748b-e053-3a05fe0a3a96
|
223
|
Access Control Management for Secure Cloud Storage, file dfa8b999-2851-748b-e053-3a05fe0a3a96
|
223
|
Toward Owners' Control in Digital Data Markets, file dfa8b9a0-ec4e-748b-e053-3a05fe0a3a96
|
222
|
Application requirements with preferences in cloud-based information processing, file dfa8b996-c027-748b-e053-3a05fe0a3a96
|
217
|
A Fuzzy-Based Brokering Service for Cloud Plan Selection, file dfa8b9a0-317a-748b-e053-3a05fe0a3a96
|
212
|
Supporting User Requirements and Preferences in Cloud Plan Selection, file dfa8b999-eaa5-748b-e053-3a05fe0a3a96
|
210
|
Selective and private access to outsourced data centers, file dfa8b995-93a3-748b-e053-3a05fe0a3a96
|
207
|
Data protection in Cloud scenarios, file dfa8b995-6b0d-748b-e053-3a05fe0a3a96
|
206
|
Empowering Owners with Control in Digital Data Markets, file dfa8b99e-e1c9-748b-e053-3a05fe0a3a96
|
204
|
Computing range queries on obfuscated data, file dfa8b98f-2ddc-748b-e053-3a05fe0a3a96
|
200
|
Supporting Users in Cloud Plan Selection, file dfa8b99d-3221-748b-e053-3a05fe0a3a96
|
198
|
Privacy in pervasive systems: social and legal aspects and technical solutions, file dfa8b995-81d0-748b-e053-3a05fe0a3a96
|
195
|
Loose associations to increase utility in data publishing, file dfa8b995-7f80-748b-e053-3a05fe0a3a96
|
194
|
Distributed Shuffle Index in the Cloud: Implementation and Evaluation, file dfa8b999-d8b6-748b-e053-3a05fe0a3a96
|
192
|
Supporting Users in Data Outsourcing and Protection in the Cloud, file dfa8b999-211f-748b-e053-3a05fe0a3a96
|
187
|
Distributed shuffle index: Analysis and implementation in an industrial testbed, file dfa8b99a-0d60-748b-e053-3a05fe0a3a96
|
187
|
Multi-Provider Secure Processing of Sensors Data, file dfa8b99e-e58a-748b-e053-3a05fe0a3a96
|
185
|
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage, file dfa8b9a0-6fd4-748b-e053-3a05fe0a3a96
|
185
|
Specification and enforcement of access policies in emerging scenarios, file dfa8b995-c444-748b-e053-3a05fe0a3a96
|
182
|
Privacy and Security in Environmental Monitoring Systems, file dfa8b99a-77e1-748b-e053-3a05fe0a3a96
|
181
|
Digital Infrastructure Policies for Data Security and Privacy in Smart Cities, file dfa8b9a9-4314-748b-e053-3a05fe0a3a96
|
168
|
Protecting resources and regulating access in cloud-based object storage, file dfa8b99d-4e40-748b-e053-3a05fe0a3a96
|
161
|
Shuffle index : efficient and private access to outsourced data, file dfa8b995-52ed-748b-e053-3a05fe0a3a96
|
158
|
Integrity for approximate joins on untrusted computational servers, file dfa8b995-624b-748b-e053-3a05fe0a3a96
|
155
|
A WOWA-based aggregation technique on trust values connected to metadata, file dfa8b99f-2ac5-748b-e053-3a05fe0a3a96
|
149
|
Access Privacy in the Cloud, file dfa8b99c-f02a-748b-e053-3a05fe0a3a96
|
144
|
Mix&Slice: efficient access revocation in the Cloud, file dfa8b996-ba70-748b-e053-3a05fe0a3a96
|
138
|
Access control for the shuffle index, file dfa8b995-54a3-748b-e053-3a05fe0a3a96
|
129
|
Security-aware data allocation in multicloud scenarios, file dfa8b9a3-482f-748b-e053-3a05fe0a3a96
|
128
|
Support for write privileges on outsourced data, file dfa8b98f-bb46-748b-e053-3a05fe0a3a96
|
113
|
Optimizing integrity checks for join queries in the cloud, file dfa8b991-323f-748b-e053-3a05fe0a3a96
|
103
|
Distributed query evaluation over encrypted data, file dfa8b9a7-718a-748b-e053-3a05fe0a3a96
|
92
|
Supporting user privacy preferences on information release in open scenarios, file dfa8b98f-7c14-748b-e053-3a05fe0a3a96
|
82
|
Artifact: Scalable Distributed Data Anonymization, file dfa8b9a7-e07c-748b-e053-3a05fe0a3a96
|
69
|
Scalable Distributed Data Anonymization, file dfa8b9a8-12f4-748b-e053-3a05fe0a3a96
|
66
|
A component-based architecture for secure data publication, file dfa8b9a2-fdad-748b-e053-3a05fe0a3a96
|
62
|
Multi-dimensional indexes for point and range queries on outsourced encrypted data, file dfa8b9a9-85f1-748b-e053-3a05fe0a3a96
|
61
|
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud, file dfa8b9a9-ad54-748b-e053-3a05fe0a3a96
|
61
|
Scalable Distributed Data Anonymization for Large Datasets, file a6275ba6-f9a4-45a5-ac3a-924a603454be
|
28
|
An authorization model for query execution in the cloud, file dfa8b9a8-c8b1-748b-e053-3a05fe0a3a96
|
23
|
Efficient integrity checks for join queries in the cloud, file dfa8b995-a30c-748b-e053-3a05fe0a3a96
|
21
|
Privacy and security in environmental monitoring systems : issues and solutions, file dfa8b993-845d-748b-e053-3a05fe0a3a96
|
12
|
Open world reasoning in semantics-aware access control: A preliminary study, file dfa8b9a0-8c06-748b-e053-3a05fe0a3a96
|
12
|
An authorization model for query execution in the cloud, file dfa8b9a8-b667-748b-e053-3a05fe0a3a96
|
5
|
Mobile agent technology for remote measurements, file dfa8b990-7603-748b-e053-3a05fe0a3a96
|
4
|
Expressive and deployable access control in open Web service applications, file dfa8b993-845c-748b-e053-3a05fe0a3a96
|
4
|
An OBDD approach to enforce confidentiality and visibility constraints in data publishing, file dfa8b993-9711-748b-e053-3a05fe0a3a96
|
4
|
An obfuscation-based approach for protecting location privacy, file dfa8b993-d41b-748b-e053-3a05fe0a3a96
|
4
|
Protecting access confidentiality with data distribution and swapping, file dfa8b992-14dc-748b-e053-3a05fe0a3a96
|
3
|
Supporting concurrency in private data outsourcing, file dfa8b993-6961-748b-e053-3a05fe0a3a96
|
3
|
Integrity for join queries in the cloud, file dfa8b993-84b1-748b-e053-3a05fe0a3a96
|
3
|
Selective data outsourcing for enforcing privacy, file dfa8b993-d388-748b-e053-3a05fe0a3a96
|
3
|
A Manifesto for Future Generation Cloud Computing, file dfa8b99d-257a-748b-e053-3a05fe0a3a96
|
3
|
Multi-Provider Secure Processing of Sensors Data, file dfa8b99f-1050-748b-e053-3a05fe0a3a96
|
3
|
k-Anonymity: From Theory to Applications, file 1d1f957f-65fd-4f8f-8512-4ed4f041ced4
|
2
|
Distributed query execution under access restrictions, file a47102b9-ac9e-4900-bc92-d49d5afe83f8
|
2
|
k-Anonymity: From Theory to Applications, file ad03c0fc-a716-4f07-8aca-7459cd54c2d2
|
2
|
Efficient and private access to outsourced data, file dfa8b993-64a8-748b-e053-3a05fe0a3a96
|
2
|
Integrating trust management and access control in data-intensive Web applications, file dfa8b993-6959-748b-e053-3a05fe0a3a96
|
2
|
Authorization enforcement in distributed query evaluation, file dfa8b993-695f-748b-e053-3a05fe0a3a96
|
2
|
Modeling and preventing inferences from sensitive value distributions in data release, file dfa8b993-84b2-748b-e053-3a05fe0a3a96
|
2
|
Supporting concurrency and multiple indexes in private access to outsourced data, file dfa8b993-c21d-748b-e053-3a05fe0a3a96
|
2
|
Distributed shuffling for preserving access confidentiality, file dfa8b993-c3f6-748b-e053-3a05fe0a3a96
|
2
|
Fragmentation in presence of data dependencies, file dfa8b993-d7f4-748b-e053-3a05fe0a3a96
|
2
|
Enforcing dynamic write privileges in data outsourcing, file dfa8b994-ae01-748b-e053-3a05fe0a3a96
|
2
|
Distributed query evaluation over encrypted data, file dfa8b9a7-592f-748b-e053-3a05fe0a3a96
|
2
|
Towards Owner-Controlled Data Sharing, file 53ecc759-cac8-4e79-8e50-c972e7e4c2e1
|
1
|
Sentinels and twins : effective integrity assessment for distributed computation, file 60411d90-160a-4af9-8105-0abf6ef5ca38
|
1
|
Supporting User Protection Requirements in Cloud-Based Data Outsourcing, file 7b489ddc-731a-4f09-81f5-e197b0c0df71
|
1
|
Distributed query execution under access restrictions, file 890991be-5db0-40cc-8d79-f29754d63ac6
|
1
|
Loose associations to increase utility in data publishing, file dfa8b995-3b2f-748b-e053-3a05fe0a3a96
|
1
|
Data security issues in cloud scenarios, file dfa8b995-5665-748b-e053-3a05fe0a3a96
|
1
|
Efficient integrity checks for join queries in the cloud, file dfa8b995-875f-748b-e053-3a05fe0a3a96
|
1
|
Access control for the shuffle index, file dfa8b996-0768-748b-e053-3a05fe0a3a96
|
1
|
Supporting Users in Cloud Plan Selection, file dfa8b99e-e0e0-748b-e053-3a05fe0a3a96
|
1
|
A Fuzzy-Based Brokering Service for Cloud Plan Selection, file dfa8b9a0-821f-748b-e053-3a05fe0a3a96
|
1
|
Toward Owners' Control in Digital Data Markets, file dfa8b9a6-be22-748b-e053-3a05fe0a3a96
|
1
|
Scalable Distributed Data Anonymization, file dfa8b9a8-2b0e-748b-e053-3a05fe0a3a96
|
1
|
Distributed query execution under access restrictions, file fd228166-488d-469f-8281-00b199edfde6
|
1
|
Totale |
14224 |