Scalable Distributed Data Anonymization | 0 | 0.34 | 2021 |
SEApp: Bringing Mandatory Access Control to Android Apps | 0 | 0.34 | 2021 |
Artifact: Scalable Distributed Data Anonymization | 0 | 0.34 | 2021 |
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud | 0 | 0.34 | 2020 |
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage | 0 | 0.34 | 2019 |
Multi-Provider Secure Processing of Sensors Data | 0 | 0.34 | 2019 |
Three-server swapping for access confidentiality | 2 | 0.38 | 2018 |
An Authorization Model for Multi-Provider Queries. | 0 | 0.34 | 2018 |
Protecting Resources and Regulating Access in Cloud-Based Object Storage. | 0 | 0.34 | 2018 |
Distributed Shuffle Index in the Cloud: Implementation and Evaluation | 0 | 0.34 | 2017 |
Distributed shuffle index: Analysis and implementation in an industrial testbed. | 0 | 0.34 | 2017 |
Access Control Management for Secure Cloud Storage. | 0 | 0.34 | 2016 |
Mix&Slice: Efficient Access Revocation in the Cloud. | 8 | 0.52 | 2016 |
Access Control for the Shuffle Index. | 1 | 0.35 | 2016 |
A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud | 0 | 0.34 | 2016 |
Efficient integrity checks for join queries in the cloud1. | 2 | 0.36 | 2016 |
Managing Data Sharing in OpenStack Swift with Over-Encryption. | 1 | 0.36 | 2016 |
A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks. | 8 | 0.57 | 2015 |
Shuffle Index: Efficient and Private Access to Outsourced Data | 5 | 0.41 | 2015 |
Loose associations to increase utility in data publishing. | 2 | 0.37 | 2015 |
Integrity for distributed queries. | 5 | 0.40 | 2014 |
Protecting Access Confidentiality with Data Distribution and Swapping | 2 | 0.39 | 2014 |
Fragmentation in Presence of Data Dependencies. | 15 | 0.56 | 2014 |
Integrity for Join Queries in the Cloud. | 15 | 0.59 | 2013 |
Extending loose associations to multiple fragments | 7 | 0.45 | 2013 |
Enforcing dynamic write privileges in data outsourcing | 18 | 0.78 | 2013 |
Distributed Shuffling for Preserving Access Confidentiality. | 9 | 0.46 | 2013 |
Minimising disclosure of client information in credential-based interactions. | 6 | 0.49 | 2012 |
Integrating trust management and access control in data-intensive Web applications | 15 | 0.70 | 2012 |
Support For Write Privileges On Outsourced Data | 5 | 0.41 | 2012 |
Supporting concurrency in private data outsourcing | 6 | 0.42 | 2011 |
Expressive and Deployable Access Control in Open Web Service Applications | 5 | 0.52 | 2011 |
Selective data outsourcing for enforcing privacy | 18 | 0.79 | 2011 |
Integrated management of security policies | 0 | 0.34 | 2011 |
Private data indexes for selective access to outsourced data | 16 | 0.63 | 2011 |
Supporting privacy preferences in credential-based interactions | 5 | 0.56 | 2010 |
Encryption policies for regulating access to outsourced data | 62 | 1.74 | 2010 |
Fragments and loose associations: respecting privacy in data publishing | 22 | 0.78 | 2010 |
Encryption-Based Policy Enforcement for Cloud Storage | 15 | 0.95 | 2010 |
Managing key hierarchies for access control enforcement: Heuristic approaches | 9 | 0.79 | 2010 |
Combining fragmentation and encryption to protect privacy in data storage | 93 | 2.79 | 2010 |
Fine-grained disclosure of access policies | 4 | 0.49 | 2010 |
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases | 29 | 1.23 | 2009 |
Privacy Of Outsourced Data | 3 | 0.44 | 2009 |
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios | 9 | 0.62 | 2009 |
Keep a few: outsourcing data while maintaining confidentiality | 32 | 1.35 | 2009 |
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients | 14 | 0.80 | 2009 |
Preserving confidentiality of security policies in data outsourcing | 27 | 1.08 | 2008 |
Fragmentation and encryption to enforce privacy in data storage | 44 | 2.06 | 2007 |
Trust management services in relational databases | 7 | 0.54 | 2007 |