Title |
Conference |
Tags |
Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems |
CODASPY2019-2019 - Dallas, United States |
|
Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems |
CODASPY2019-2019 - Dallas, United States |
|
On the Suitability of Dissemination-centric Access Control Systems for Group-centric Sharing |
CODASPY-2014 - San Antonio, USA |
|
Application-Sensitive Access Control Evaluation using Parameterized Expressiveness |
CSF-2013 - Louisiana,USA |
|
Access control for applications |
Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA |
Security
|
Insured Access: An Approach to Ad-hoc Information Sharing for Virtual Organizations |
Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA |
|
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice |
Symposium On Usable Privacy and Security-2012 - Washington |
|
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice |
SOUPS-2012 - Washington,USA |
|