10 LIVROS EM UCRANIANO RELACIONADOS COM «САМАРАТИ»
Descubra o uso de
самарати na seguinte seleção bibliográfica. Livros relacionados com
самарати e pequenos extratos deles para contextualizar o seu uso na literatura.
1
Computer Security - ESORICS 2004: 9th European Symposium ...
This book constitutes the refereed proceedings of the 9th European Symposium on Research in Computer Security, ESORICS 2004, held in Sophia Antipolis, France in September 2004.
Pierangela Samarati, 2004
2
Information Security: 12th International Conference, ISC ...
This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.
Pierangela Samarati, Moti Yung, Fabio Martinelli, 2009
3
Information Security Theory and Practices: Security and ...
This volume constitutes the refereed proceedings of the 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, WISTP 2010, held in Passau, Germany, ...
Pierangela Samarati, Michael Tunstall, Joachim Posegga, 2010
4
Research Directions in Data and Applications Security ... - Сторінка 141
IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain Csilla Farkas, Pierangela Samarati. formal derivation rules on the labels, in the style of [6], to assist in the static ...
Csilla Farkas, Pierangela Samarati, 2006
5
Secure Cloud Computing - Сторінка 146
Ardagna, C.A., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Samarati, P.: Supporting privacy preferences in credential-based interactions. In: Proc. of WPES 2010. Chicago, IL, USA (October 2010) 7. Ardagna, C.A., De Capitani di ...
Sushil Jajodia, Krishna Kant, Pierangela Samarati, 2014
6
Computing Handbook, Third Edition: Information Systems and ...
31. 32. A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM TISSEC, 8(1):119–152, February 2005. B. Chor and N. Gilboa.
Heikki Topi, Allen Tucker, 2014
7
Security and Privacy in the Age of Uncertainty: IFIP TC11 ...
IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece Sabrina de Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas. in particular graphical formats, are considered by many ...
Sabrina de Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas, 2013
8
Information Security Practice and Experience: 10th ... - Сторінка 39
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 171–186.
Xinyi Huang, Jianying Zhou, 2014
9
Information Systems Security: Third International ... - Сторінка 191
In: ASI- ACCS 2006. Proc. of the ACM Symposium on InformAtion, Computer and Communications Security, Taipei, Taiwan (March 2006) 4. Ardagna, C.A., Damiani, E., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Trust management.
Patrick McDaniel, Shyam K. Gupta, 2007
10
Protecting Privacy in Data Release - Сторінка 188
JDS 4(4), 387–398 (2006) V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, Fragmentation and encryption to enforce privacy in data storage, in Proceedings of ESORICS 2007, Dresden, 2007 V. Ciriani, ...