Nome |
# |
Preserving privacy in data outsourcing, file dfa8b98f-9557-748b-e053-3a05fe0a3a96
|
2182
|
Access control for smarter healthcare using policy spaces, file dfa8b98f-9556-748b-e053-3a05fe0a3a96
|
823
|
Protecting data in outsourcing scenarios, file dfa8b98f-9cd9-748b-e053-3a05fe0a3a96
|
667
|
Data security issues in cloud scenarios, file dfa8b995-94f6-748b-e053-3a05fe0a3a96
|
391
|
Minimising disclosure of client information in credential-based interactions, file dfa8b98f-b2f5-748b-e053-3a05fe0a3a96
|
363
|
Data Security and Privacy in the Cloud, file dfa8b99e-4c72-748b-e053-3a05fe0a3a96
|
291
|
Practical techniques building on encryption for protecting and managing data in the Cloud, file dfa8b995-5666-748b-e053-3a05fe0a3a96
|
275
|
Securing Resources in Decentralized Cloud Storage, file dfa8b99e-4feb-748b-e053-3a05fe0a3a96
|
271
|
An Authorization Model for Multi-Provider Queries, file dfa8b99a-31ce-748b-e053-3a05fe0a3a96
|
247
|
Enforcing authorizations while protecting access confidentiality, file dfa8b99a-1536-748b-e053-3a05fe0a3a96
|
246
|
Three-server swapping for access confidentiality, file dfa8b995-3dc5-748b-e053-3a05fe0a3a96
|
240
|
Confidentiality Protection in Large Databases, file dfa8b998-9c1f-748b-e053-3a05fe0a3a96
|
234
|
Minimizing disclosure of private information in credential-based interactions : a graph-based approach, file dfa8b98f-9655-748b-e053-3a05fe0a3a96
|
233
|
Managing data sharing in OpenStack Swift with Over-Encryption, file dfa8b996-e848-748b-e053-3a05fe0a3a96
|
227
|
A dynamic tree-based data structure for access privacy in the cloud, file dfa8b998-5cb9-748b-e053-3a05fe0a3a96
|
223
|
Access Control Management for Secure Cloud Storage, file dfa8b999-2851-748b-e053-3a05fe0a3a96
|
223
|
Toward Owners' Control in Digital Data Markets, file dfa8b9a0-ec4e-748b-e053-3a05fe0a3a96
|
223
|
A consensus-based approach for selecting cloud plans, file dfa8b996-fdf0-748b-e053-3a05fe0a3a96
|
221
|
A Fuzzy-Based Brokering Service for Cloud Plan Selection, file dfa8b9a0-317a-748b-e053-3a05fe0a3a96
|
213
|
Supporting User Requirements and Preferences in Cloud Plan Selection, file dfa8b999-eaa5-748b-e053-3a05fe0a3a96
|
211
|
On the use of fuzzy logic in dependable cloud management, file dfa8b995-7f83-748b-e053-3a05fe0a3a96
|
210
|
Data protection in Cloud scenarios, file dfa8b995-6b0d-748b-e053-3a05fe0a3a96
|
207
|
Selective and private access to outsourced data centers, file dfa8b995-93a3-748b-e053-3a05fe0a3a96
|
207
|
Empowering Owners with Control in Digital Data Markets, file dfa8b99e-e1c9-748b-e053-3a05fe0a3a96
|
205
|
Supporting Users in Cloud Plan Selection, file dfa8b99d-3221-748b-e053-3a05fe0a3a96
|
199
|
Loose associations to increase utility in data publishing, file dfa8b995-7f80-748b-e053-3a05fe0a3a96
|
196
|
Privacy in pervasive systems: social and legal aspects and technical solutions, file dfa8b995-81d0-748b-e053-3a05fe0a3a96
|
195
|
Distributed Shuffle Index in the Cloud: Implementation and Evaluation, file dfa8b999-d8b6-748b-e053-3a05fe0a3a96
|
192
|
Supporting Users in Data Outsourcing and Protection in the Cloud, file dfa8b999-211f-748b-e053-3a05fe0a3a96
|
187
|
Distributed shuffle index: Analysis and implementation in an industrial testbed, file dfa8b99a-0d60-748b-e053-3a05fe0a3a96
|
187
|
Multi-Provider Secure Processing of Sensors Data, file dfa8b99e-e58a-748b-e053-3a05fe0a3a96
|
185
|
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage, file dfa8b9a0-6fd4-748b-e053-3a05fe0a3a96
|
185
|
Specification and enforcement of access policies in emerging scenarios, file dfa8b995-c444-748b-e053-3a05fe0a3a96
|
182
|
Selective access for supply chain management in the cloud, file dfa8b999-e02c-748b-e053-3a05fe0a3a96
|
173
|
Digital Infrastructure Policies for Data Security and Privacy in Smart Cities, file dfa8b9a9-4314-748b-e053-3a05fe0a3a96
|
173
|
Protecting resources and regulating access in cloud-based object storage, file dfa8b99d-4e40-748b-e053-3a05fe0a3a96
|
161
|
Shuffle index : efficient and private access to outsourced data, file dfa8b995-52ed-748b-e053-3a05fe0a3a96
|
158
|
Integrity for approximate joins on untrusted computational servers, file dfa8b995-624b-748b-e053-3a05fe0a3a96
|
156
|
Access Privacy in the Cloud, file dfa8b99c-f02a-748b-e053-3a05fe0a3a96
|
144
|
Mix&Slice: efficient access revocation in the Cloud, file dfa8b996-ba70-748b-e053-3a05fe0a3a96
|
138
|
Access control for the shuffle index, file dfa8b995-54a3-748b-e053-3a05fe0a3a96
|
129
|
Security-aware data allocation in multicloud scenarios, file dfa8b9a3-482f-748b-e053-3a05fe0a3a96
|
128
|
Support for write privileges on outsourced data, file dfa8b98f-bb46-748b-e053-3a05fe0a3a96
|
113
|
Cloud plan selection under requirements of multiple applications, file dfa8b99c-dcc2-748b-e053-3a05fe0a3a96
|
112
|
Optimizing integrity checks for join queries in the cloud, file dfa8b991-323f-748b-e053-3a05fe0a3a96
|
103
|
Distributed query evaluation over encrypted data, file dfa8b9a7-718a-748b-e053-3a05fe0a3a96
|
92
|
Selective Owner-Side Encryption in Digital Data Markets: Strategies for Key Derivation, file dfa8b9a7-6e78-748b-e053-3a05fe0a3a96
|
91
|
Supporting user privacy preferences on information release in open scenarios, file dfa8b98f-7c14-748b-e053-3a05fe0a3a96
|
82
|
Artifact: Scalable Distributed Data Anonymization, file dfa8b9a7-e07c-748b-e053-3a05fe0a3a96
|
69
|
Scalable Distributed Data Anonymization, file dfa8b9a8-12f4-748b-e053-3a05fe0a3a96
|
67
|
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud, file dfa8b9a9-ad54-748b-e053-3a05fe0a3a96
|
62
|
Multi-dimensional indexes for point and range queries on outsourced encrypted data, file dfa8b9a9-85f1-748b-e053-3a05fe0a3a96
|
61
|
Scalable Distributed Data Anonymization for Large Datasets, file a6275ba6-f9a4-45a5-ac3a-924a603454be
|
28
|
An authorization model for query execution in the cloud, file dfa8b9a8-c8b1-748b-e053-3a05fe0a3a96
|
23
|
Efficient integrity checks for join queries in the cloud, file dfa8b995-a30c-748b-e053-3a05fe0a3a96
|
21
|
Network and System Security, NSS, International Conference on, file dfa8b99f-464a-748b-e053-3a05fe0a3a96
|
7
|
Cloud plan selection under requirements of multiple applications, file dfa8b99c-ffb4-748b-e053-3a05fe0a3a96
|
5
|
An authorization model for query execution in the cloud, file dfa8b9a8-b667-748b-e053-3a05fe0a3a96
|
5
|
An OBDD approach to enforce confidentiality and visibility constraints in data publishing, file dfa8b993-9711-748b-e053-3a05fe0a3a96
|
4
|
Protecting access confidentiality with data distribution and swapping, file dfa8b992-14dc-748b-e053-3a05fe0a3a96
|
3
|
Supporting concurrency in private data outsourcing, file dfa8b993-6961-748b-e053-3a05fe0a3a96
|
3
|
Integrity for join queries in the cloud, file dfa8b993-84b1-748b-e053-3a05fe0a3a96
|
3
|
Selective data outsourcing for enforcing privacy, file dfa8b993-d388-748b-e053-3a05fe0a3a96
|
3
|
Multi-Provider Secure Processing of Sensors Data, file dfa8b99f-1050-748b-e053-3a05fe0a3a96
|
3
|
k-Anonymity: From Theory to Applications, file 1d1f957f-65fd-4f8f-8512-4ed4f041ced4
|
2
|
Supporting User Protection Requirements in Cloud-Based Data Outsourcing, file 7b489ddc-731a-4f09-81f5-e197b0c0df71
|
2
|
Distributed query execution under access restrictions, file a47102b9-ac9e-4900-bc92-d49d5afe83f8
|
2
|
k-Anonymity: From Theory to Applications, file ad03c0fc-a716-4f07-8aca-7459cd54c2d2
|
2
|
Efficient and private access to outsourced data, file dfa8b993-64a8-748b-e053-3a05fe0a3a96
|
2
|
Integrating trust management and access control in data-intensive Web applications, file dfa8b993-6959-748b-e053-3a05fe0a3a96
|
2
|
Authorization enforcement in distributed query evaluation, file dfa8b993-695f-748b-e053-3a05fe0a3a96
|
2
|
Modeling and preventing inferences from sensitive value distributions in data release, file dfa8b993-84b2-748b-e053-3a05fe0a3a96
|
2
|
Supporting concurrency and multiple indexes in private access to outsourced data, file dfa8b993-c21d-748b-e053-3a05fe0a3a96
|
2
|
Distributed shuffling for preserving access confidentiality, file dfa8b993-c3f6-748b-e053-3a05fe0a3a96
|
2
|
Fragmentation in presence of data dependencies, file dfa8b993-d7f4-748b-e053-3a05fe0a3a96
|
2
|
Enforcing dynamic write privileges in data outsourcing, file dfa8b994-ae01-748b-e053-3a05fe0a3a96
|
2
|
Distributed query evaluation over encrypted data, file dfa8b9a7-592f-748b-e053-3a05fe0a3a96
|
2
|
Towards Owner-Controlled Data Sharing, file 53ecc759-cac8-4e79-8e50-c972e7e4c2e1
|
1
|
Sentinels and twins : effective integrity assessment for distributed computation, file 60411d90-160a-4af9-8105-0abf6ef5ca38
|
1
|
Distributed query execution under access restrictions, file 890991be-5db0-40cc-8d79-f29754d63ac6
|
1
|
Loose associations to increase utility in data publishing, file dfa8b995-3b2f-748b-e053-3a05fe0a3a96
|
1
|
On the use of fuzzy logic in dependable cloud management, file dfa8b995-459b-748b-e053-3a05fe0a3a96
|
1
|
Data security issues in cloud scenarios, file dfa8b995-5665-748b-e053-3a05fe0a3a96
|
1
|
Efficient integrity checks for join queries in the cloud, file dfa8b995-875f-748b-e053-3a05fe0a3a96
|
1
|
Access control for the shuffle index, file dfa8b996-0768-748b-e053-3a05fe0a3a96
|
1
|
Supporting Users in Cloud Plan Selection, file dfa8b99e-e0e0-748b-e053-3a05fe0a3a96
|
1
|
A Fuzzy-Based Brokering Service for Cloud Plan Selection, file dfa8b9a0-821f-748b-e053-3a05fe0a3a96
|
1
|
Toward Owners' Control in Digital Data Markets, file dfa8b9a6-be22-748b-e053-3a05fe0a3a96
|
1
|
Scalable Distributed Data Anonymization, file dfa8b9a8-2b0e-748b-e053-3a05fe0a3a96
|
1
|
Distributed query execution under access restrictions, file fd228166-488d-469f-8281-00b199edfde6
|
1
|
Totale |
12900 |