TREDISEC: Trust-aware reliable and distributed information security in the cloud | 0 | 0.34 | 2015 |
Privacy by Encrypted Databases. | 2 | 0.41 | 2014 |
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data. | 6 | 0.50 | 2014 |
An Encrypted In-Memory Column-Store: The Onion Selection Problem. | 4 | 0.43 | 2013 |
Adjustably encrypted in-memory column-store. | 3 | 0.41 | 2013 |
Optimal re-encryption strategy for joins in encrypted databases | 11 | 0.58 | 2013 |
Avoiding Policy-based Deadlocks in Business Processes | 9 | 0.49 | 2008 |
ProActive Access Control for Business Process-Driven Environments | 6 | 0.64 | 2008 |
Classification Model For Access Control Constraints | 5 | 0.51 | 2007 |