The proceedings contain 30 papers. The special focus in this conference is on Data and Applications Security and Privacy. The topics include: Resilient reference monitor for distributed access control via moving target defense; preventing unauthorized data flows; object-tagged RBAC model for the hadoop ecosystem; identification of access control policy sentences from natural language policy documents; fast distributed evaluation of stateful attribute-based access control policies; Gaussian mixture models for classification and hypothesis tests under differential privacy; differentially private k skyband query answering through adaptive spatial decomposition; mutually private location proximity detection with access control; privacy-preservi...
Many organizations demand efficient solutions to store and analyze huge amount of information. Cloud...
7th International Conference on Application of Information and Communication Technologies, AICT 2013...
The adoption of cloud environment for various application uses has led to security and privacy conce...
The proceedings contain 17 papers. The special focus in this conference is on Quantitative Aspects i...
Book Front Matter of LNCS 7371International audienceThe 17 revised full and 15 short papers presente...
This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Confer...
This year was the ninth edition of the VLDB Secure Data Management Workshop. The topic of data secur...
Preface. This year was the eighth edition of the VLDB Secure Data Management Workshop. The topic of ...
Preface. The new emerging technologies put new requirements on security and data management. As data...
Data has been widely recognized as one of the most valuable assets that can be utilized to make dyna...
Cloud computing is a computing technology or information technology architecture used by organizatio...
Thesis (Ph.D.)--University of Washington, 2017-08As the cloud handles more user data, users need bet...
[[abstract]]Due to the ever-updated technology of the Internet and the acceleration of network bandw...
This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy...
Abstract — this paper summarizes opportunities and challenges concerning how we can achieve security...
Many organizations demand efficient solutions to store and analyze huge amount of information. Cloud...
7th International Conference on Application of Information and Communication Technologies, AICT 2013...
The adoption of cloud environment for various application uses has led to security and privacy conce...
The proceedings contain 17 papers. The special focus in this conference is on Quantitative Aspects i...
Book Front Matter of LNCS 7371International audienceThe 17 revised full and 15 short papers presente...
This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Confer...
This year was the ninth edition of the VLDB Secure Data Management Workshop. The topic of data secur...
Preface. This year was the eighth edition of the VLDB Secure Data Management Workshop. The topic of ...
Preface. The new emerging technologies put new requirements on security and data management. As data...
Data has been widely recognized as one of the most valuable assets that can be utilized to make dyna...
Cloud computing is a computing technology or information technology architecture used by organizatio...
Thesis (Ph.D.)--University of Washington, 2017-08As the cloud handles more user data, users need bet...
[[abstract]]Due to the ever-updated technology of the Internet and the acceleration of network bandw...
This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy...
Abstract — this paper summarizes opportunities and challenges concerning how we can achieve security...
Many organizations demand efficient solutions to store and analyze huge amount of information. Cloud...
7th International Conference on Application of Information and Communication Technologies, AICT 2013...
The adoption of cloud environment for various application uses has led to security and privacy conce...