Sciweavers

14824 search results - page 18 / 2965
» Security - Introduction
Sort
View
97
Voted
IDTRUST
2010
ACM
15 years 9 months ago
Efficient and privacy-preserving enforcement of attribute-based access control
Ning Shang, Federica Paci, Elisa Bertino
94
Voted
CCS
2010
ACM
15 years 9 months ago
Oblivious enforcement of hidden information release policies
Brian Wongchaowart, Adam J. Lee
ACSAC
2009
IEEE
15 years 9 months ago
Leveraging Cellular Infrastructure to Improve Fraud Prevention
Frank S. Park, Chinmay Gangakhedkar, Patrick Trayn...
IEEEARES
2009
IEEE
15 years 9 months ago
Risk-Driven Architectural Decomposition
Thomas Heyman, Riccardo Scandariato, Wouter Joosen