A Kernel Machine For Hidden Object-Ranking Problems (Horps) Formalization And Application To Tahitian Black Pearls Quality Assessment | 0 | 0.34 | 2020 |
Access Controls for IoT Networks. | 1 | 0.36 | 2020 |
Ordinal Learning With Vector Space Based Binary Predicates And Its Application To Tahitian Pearls' Luster Automatic Assessment | 0 | 0.34 | 2018 |
Regulating Iot Messages | 0 | 0.34 | 2018 |
A Security Model for IoT Networks. | 0 | 0.34 | 2018 |
Computer vision based nacre thickness measurement of Tahitian pearls. | 0 | 0.34 | 2017 |
A comprehensive view on quantity based aggregation for cadastral databases. | 0 | 0.34 | 2017 |
Tahitian Pearls' Luster Assessment Automation | 0 | 0.34 | 2017 |
A Quantity Based Aggregation Control Model for Graph Databases. | 0 | 0.34 | 2016 |
Automatic Nacre Thickness Measurement Of Tahitian Pearls | 2 | 0.44 | 2015 |
Implementing Quantity Based Aggregation Control for Cadastral Databases | 2 | 0.37 | 2014 |
Quantity based aggregation for cadastral databases | 2 | 0.38 | 2014 |
Automatic Classification of Tahitian Pearls | 1 | 0.40 | 2014 |
Cover story management | 16 | 0.74 | 2014 |
Collusion Resistant Inference Control for Cadastral Databases | 3 | 0.39 | 2013 |
Toward a Normalized XML Schema for the GGP Data Archives. | 0 | 0.34 | 2013 |
Information Security Risk Management in a World of Services | 1 | 0.36 | 2013 |
Enforcing protection mechanisms for geographic data | 1 | 0.35 | 2012 |
A Fine-Grained Image Access Control Model | 2 | 0.38 | 2012 |
A Privacy Model For Social Networks | 0 | 0.34 | 2011 |
The Image Protector - A Flexible Security Rule Specification Toolkit . | 4 | 0.41 | 2011 |
A View Based Access Control Model for SPARQL | 7 | 0.49 | 2010 |
Security mechanisms for geographic data | 1 | 0.36 | 2010 |
Rule-based policy enforcement point for map services | 2 | 0.37 | 2010 |
Dynamic security rules for geo data | 6 | 0.48 | 2009 |
Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model | 1 | 0.36 | 2009 |
On Key Distribution in MANETs | 0 | 0.34 | 2009 |
Security policies for the visualization of Geo Data | 3 | 0.41 | 2009 |
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper) | 1 | 0.37 | 2008 |
Signtiming scheme based on aggregate signature | 1 | 0.37 | 2008 |
A General Approach to Securely Querying XML | 20 | 0.73 | 2008 |
DRM policies for web map service | 1 | 0.36 | 2008 |
Introduction Selection of articles from the SAR-SSI 2006. | 0 | 0.34 | 2007 |
Securely Updating XML | 6 | 0.46 | 2007 |
Etude des systèmes d'horodatage | 1 | 0.39 | 2007 |
Availability Constraints for Avionic Data Buses | 2 | 0.41 | 2006 |
Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006 | 16 | 2.45 | 2006 |
A New Persistent Labelling Scheme for XML | 0 | 0.34 | 2006 |
A Logical Formalization Of Secure Xml Database | 0 | 0.34 | 2006 |
A new timestamping scheme based on skip lists | 5 | 0.44 | 2006 |
Directions and trends of XML and web service security | 0 | 0.34 | 2006 |
Secure time-stamping schemes: a distributed point of view. | 7 | 0.60 | 2006 |
Availability of ARINC 629 Avionic Data Bus | 1 | 0.39 | 2006 |
A New Digital Notary System | 0 | 0.34 | 2006 |
A persistent labelling scheme for XML and tree databases | 1 | 0.36 | 2005 |
A formal access control model for XML databases | 15 | 0.77 | 2005 |
CHRONOS: an authenticated dictionary based on skip lists for timestamping systems | 16 | 0.89 | 2005 |
An authorization model for XML databases | 17 | 0.91 | 2004 |
An Access Control Model for Tree Data Structures | 5 | 0.51 | 2002 |
A two-level time-stamping system | 2 | 0.44 | 2001 |