CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.
Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .
Resultado final
It provides the final version of the security requirements coming from the use cases. (T1.1)
Report on multi cloud and federated cloud (se abrirá en una nueva ventana)It provides a final version of the techniques designed and implemented in this WP. (T4.*)
Report on secure information sharing in the cloud (se abrirá en una nueva ventana)It provides the techniques for supporting secure and selective information sharing. (T3.*)
Report on techniques for security testing (se abrirá en una nueva ventana)It provides the techniques for security testing. (T3.4)
Report on techniques for selective access (se abrirá en una nueva ventana)It provides a first version of the techniques for enforcing selective access on outsourced data. (T3.1)
Final evaluation report from use cases (se abrirá en una nueva ventana)It reports on the assessment and evaluation of the techniques and tools available in WPs2–4 with respect to the satisfaction of the security requirements of the use cases. (T1.4)
Report on research alignment and deployment status (se abrirá en una nueva ventana)It reports on the status about the alignment between the research and technological development in WPs24 and the requirements of the use cases T12
First report on multi cloud and federated cloud (se abrirá en una nueva ventana)It provides a first version of the protection techniques that leverage multiple providers. (T4.*)
First report on security metrics and assessment (se abrirá en una nueva ventana)It provides a formal definition of the security metrics that can be used to characterise the guarantees offered by different providers T41
Report on data protection techniques (se abrirá en una nueva ventana)It provides a first version of the data protection techniques designed in the WP T2
Report on requirement-based threat analysis (se abrirá en una nueva ventana)It provides techniques for estimating risks based on requirementbased threat analysis T24
Report on data and access protection (se abrirá en una nueva ventana)It provides an extension of the protection techniques presented in D21 T2
Final report on data protection and key management solutions (se abrirá en una nueva ventana)It illustrates the complete techniques for protecting data and accesses and for key management. (T2.*)
Final version of data management plan (se abrirá en una nueva ventana)It provides the final detailed description of the data management plan T61
Report on techniques for selective and secure data sharing (se abrirá en una nueva ventana)It provides techniques for ensuring collaborative access to data while ensuring the confidentiality and integrity of data and processes T3
First version of requirements from the use cases (se abrirá en una nueva ventana)It provides a first version of the security requirements coming from the use cases T11
It provides a detailed description of the data management plan. (T6.1)
It provides the prototype applications for the use cases leveraging the tools in W13W16 T13
Tools for selective and private multi-user queries and interactions (se abrirá en una nueva ventana)It provides tools for supporting the private collaborative execution of queries. (T3.3)
Final versions of tools for security with multiple providers (se abrirá en una nueva ventana)It provides the tools implementing the protection techniques developed in this WP T4
Tools for protecting confidentiality and integrity of data and access (se abrirá en una nueva ventana)It provides a first version of the tools developed for protecting the confidentiality and integrity of outsourced data and their accesses. (T2.1, T2.3)
Final tools for the protection of integrity and confidentiality of data and access (se abrirá en una nueva ventana)It provides the final version of the tools developed for protecting the confidentiality and integrity of outsourced data and their accesses according to the findings in D23 T21 T23
Publicaciones
Autores:
Jolanda Modic, Ruben Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri
Publicado en:
Computers & Security, Edición 62, 2016, Página(s) 1-18, ISSN 0167-4048
Editor:
Pergamon Press Ltd.
DOI:
10.1016/j.cose.2016.06.003
Autores:
Marcus Brandenburger, Christian Cachin, Nikola Knežević
Publicado en:
ACM Transactions on Privacy and Security, Edición 20/3, 2017, Página(s) 1-30, ISSN 2471-2566
Editor:
ACM Press
DOI:
10.1145/3079762
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
Publicado en:
Journal of Computer Security, Edición 26/2, 2018, Página(s) 143-175, ISSN 0926-227X
Editor:
IOS Press
DOI:
10.3233/JCS-171004
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
Publicado en:
Proceedings of the VLDB Endowment, Edición 11/3, 2017, Página(s) 256-268, ISSN 2150-8097
Editor:
VLDB
DOI:
10.14778/3157794.3157796
Autores:
SABRINA DE CAPITANI DI VIMERCATI, Sara Foresti, Giovanni Livraga, Vincenzo Piuri, Pierangela Samarati
Publicado en:
IEEE Transactions on Services Computing, 2017, Página(s) 1-1, ISSN 1939-1374
Editor:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TSC.2017.2777977
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Publicado en:
Journal of Computer Security, Edición 24/3, 2016, Página(s) 347-378, ISSN 0926-227X
Editor:
IOS Press
DOI:
10.3233/JCS-160545
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
Publicado en:
IEEE Transactions on Cloud Computing, 2015, Página(s) 1-1, ISSN 2168-7161
Editor:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/TCC.2015.2449993
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
Publicado en:
Journal of Computer Security, Edición 23/1, 2015, Página(s) 59-88, ISSN 0926-227X
Editor:
IOS Press
DOI:
10.3233/JCS-140513
Autores:
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
Publicado en:
ACM Transactions on Storage, Edición 11/4, 2015, Página(s) 1-55, ISSN 1553-3077
Editor:
Association for Computing Machinary, Inc.
DOI:
10.1145/2747878
Autores:
Ruben Trapero, Jolanda Modic, Miha Stopar, Ahmed Taha, Neeraj Suri
Publicado en:
Future Generation Computer Systems, Edición 72, 2017, Página(s) 193-205, ISSN 0167-739X
Editor:
Elsevier BV
DOI:
10.1016/j.future.2016.06.004
Autores:
Jesus Luna, Neeraj Suri, Michaela Iorga, Anil Karmel
Publicado en:
IEEE Cloud Computing, Edición 2/3, 2015, Página(s) 32-40, ISSN 2325-6095
Editor:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/MCC.2015.52
Autores:
Jesus Luna, Ahmed Taha, Ruben Trapero, Neeraj Suri
Publicado en:
IEEE Transactions on Cloud Computing, 2015, Página(s) 1-1, ISSN 2168-7161
Editor:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/TCC.2015.2469659
Autores:
Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
Publicado en:
IACR ePrint Archive, 2017
Editor:
IACR
Autores:
Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rudiger Kapitza
Publicado en:
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Página(s) 157-168, ISBN 978-1-5386-0542-4
Editor:
IEEE
DOI:
10.1109/DSN.2017.45
Autores:
Christian Cachin
Publicado en:
2017 13th European Dependable Computing Conference (EDCC), 2017, Página(s) 1-2, ISBN 978-1-5386-0602-5
Editor:
IEEE
DOI:
10.1109/EDCC.2017.36
Autores:
Christian Cachin, Marko Vukolić
Publicado en:
31st International Symposium on Distributed Computing (DISC 2017), 2017, ISBN 978-3-95977-053-8
Editor:
LIPIcs
DOI:
10.4230/LIPIcs.DISC.2017.1
Autores:
Mathias Björkqvist, Christian Cachin, Felix Engelmann, Alessandro Sorniotti
Publicado en:
IEEE International Conference in Cloud Engineering, 2018
Editor:
IEEE Press
Autores:
Anselme Kemgne Tueno, Florian Kerschbaum, Daniel Bernau, Sara Foresti
Publicado en:
Workshop on Security and Privacy in the Cloud, 2017
Editor:
IEEE
Autores:
Marcus Brandenburger, Christian Cachin, Nikola Knežević
Publicado en:
Proceedings of the 8th ACM International Systems and Storage Conference on - SYSTOR '15, 2015, Página(s) 1-11, ISBN 9781-450336079
Editor:
ACM Press
DOI:
10.1145/2757667.2757681
Autores:
Anselme Tueno, Florian Kerschbaum, Daniel Bernau, Sara Foresti
Publicado en:
2017 IEEE Conference on Communications and Network Security (CNS), 2017, Página(s) 476-482, ISBN 978-1-5386-0683-4
Editor:
IEEE
DOI:
10.1109/CNS.2017.8228710
Autores:
Enrico Bacis, Alan Barnett, Andrew Byrne, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
Publicado en:
2017 IEEE Conference on Communications and Network Security (CNS), 2017, Página(s) 396-397, ISBN 978-1-5386-0683-4
Editor:
IEEE
DOI:
10.1109/CNS.2017.8228695
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Riccardo Moretti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
Publicado en:
2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Página(s) 391-398, ISBN 978-1-5090-1445-3
Editor:
IEEE
DOI:
10.1109/CloudCom.2016.0068
Autores:
Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
Publicado en:
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), 2017, Página(s) 139-144, ISBN 978-1-5090-6644-5
Editor:
IEEE
DOI:
10.1109/CSCloud.2017.25
Autores:
Ala Arman, Sara Foresti, Giovanni Livraga, Pierangela Samarati
Publicado en:
2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), 2016, Página(s) 1-6, ISBN 978-1-5090-1131-5
Editor:
IEEE
DOI:
10.1109/RTSI.2016.7740642
Autores:
Sabrina De Capitani di Vimercati, Giovanni Livraga, Vincenzo Piuri
Publicado en:
2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), 2016, Página(s) 1-4, ISBN 978-1-5090-1131-5
Editor:
IEEE
DOI:
10.1109/RTSI.2016.7740622
Autores:
Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
Publicado en:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Página(s) 217-228, ISBN 9781-450341394
Editor:
ACM Press
DOI:
10.1145/2976749.2978377
Autores:
Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
Publicado en:
2016, Página(s) 353-372
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-59608-2_21
Autores:
Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Daniele Guttadoro, Stefano Paraboschi, Marco Rosa, Pierangela Samarati, Alessandro Saullo
Publicado en:
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security - WISCS'16, 2016, Página(s) 39-48, ISBN 9781-450345651
Editor:
ACM Press
DOI:
10.1145/2994539.2994549
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
Publicado en:
2016, Página(s) 130-147
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-41483-6_10
Autores:
Gery Ducatel
Publicado en:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Página(s) 675-679, ISBN 978-1-4673-7876-5
Editor:
IEEE
DOI:
10.1109/CNS.2015.7346886
Autores:
Enrico Bacis, Marco Rosa, Ali Sajjad
Publicado en:
2017 IEEE Conference on Communications and Network Security (CNS), 2017, Página(s) 483-486, ISBN 978-1-5386-0683-4
Editor:
IEEE
DOI:
10.1109/CNS.2017.8228711
Autores:
Enrico Bacis, Simone Mutti, Steven Capelli, Stefano Paraboschi
Publicado en:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Página(s) 749-750, ISBN 978-1-4673-7876-5
Editor:
IEEE
DOI:
10.1109/CNS.2015.7346917
Autores:
Simone Mutti, Enrico Bacis, Stefano Paraboschi
Publicado en:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Página(s) 747-748, ISBN 978-1-4673-7876-5
Editor:
IEEE
DOI:
10.1109/CNS.2015.7346916
Autores:
Simone Mutti, Enrico Bacis, Stefano Paraboschi
Publicado en:
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense - SafeConfig '15, 2015, Página(s) 33-38, ISBN 9781-450338219
Editor:
ACM Press
DOI:
10.1145/2809826.2809832
Autores:
Enrico Bacis, Simone Mutti, Stefano Paraboschi
Publicado en:
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15, 2015, Página(s) 309-320, ISBN 9781-450332453
Editor:
ACM Press
DOI:
10.1145/2714576.2714626
Autores:
Simone Mutti, Enrico Bacis, Stefano Paraboschi
Publicado en:
Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015, 2015, Página(s) 411-420, ISBN 9781-450336826
Editor:
ACM Press
DOI:
10.1145/2818000.2818041
Autores:
Sabrina De Capitani di Vimercati, Giovanni Livraga, Vincenzo Piuri, Pierangela Samarati, Gerson A. Soares
Publicado en:
Proceedings of the International Conference on Internet of Things and Big Data, 2016, Página(s) 65-72, ISBN 978-989-758-183-0
Editor:
SCITEPRESS - Science and and Technology Publications
DOI:
10.5220/0005877000650072
Autores:
Quang Hieu Vu, Maurizio Colombo, Rasool Asal, Ali Sajjad, Fadi Ali El-Moussa, Theo Dimitrakos
Publicado en:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Página(s) 638-642, ISBN 978-1-4673-7876-5
Editor:
IEEE
DOI:
10.1109/CNS.2015.7346879
Autores:
Abraham Chan, Stefan Winter, Habib Saissi, Karthik Pattabiraman, Neeraj Suri
Publicado en:
2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), Edición Annual, 2017, Página(s) 184-195, ISBN 978-1-5090-6031-3
Editor:
IEEE
DOI:
10.1109/ICST.2017.24
Autores:
Benny Fuhry, Walter Tighzert, Florian Kerschbaum
Publicado en:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Página(s) 35-46, ISBN 9781-450345729
Editor:
ACM Press
DOI:
10.1145/2996429.2996438
Autores:
Florian Hahn, Florian Kerschbaum
Publicado en:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Página(s) 23-34, ISBN 9781-450345729
Editor:
ACM Press
DOI:
10.1145/2996429.2996437
Autores:
Soha Albaghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri
Publicado en:
Proc. of ARES (Availability, Reliability and Security) 2017, 2017
Editor:
ACM
DOI:
10.1145/3098954.3098967
Autores:
Ahmed Taha, Ruben Trapero, Jesus Luna, Neeraj Suri
Publicado en:
Proc. of Service Computing (SCC), 2017, Edición Yearly, 2017, Página(s) 322-329
Editor:
IEEE
DOI:
10.1109/SCC.2017.48
Autores:
Salman Manzoor, Jesus Luna and Neeraj Suri
Publicado en:
Proc of Service Computing (SCC), 2017, Edición Yearly, 2017, Página(s) 499-502
Editor:
IEEE
DOI:
10.1109/SCC.2017.74
Autores:
Heng Zhang, Jesus Luna, Ruben Trapero and Neeraj Suri
Publicado en:
Proc of Service Computing (SCC) 2017, Edición Yearly, 2017, Página(s) 27-34
Editor:
IEEE
DOI:
10.1109/SCC.2017.13
Autores:
Ahmed Taha, Salman Manzoor and Neeraj Suri
Publicado en:
Proc of EDGE 2017, Edición Yearly, 2017, Página(s) 65-72
Editor:
IEEE
DOI:
10.1109/IEEE.EDGE.2017.17
Autores:
Sara Foresti, Vincenzo Piuri, Gerson A. Soares
Publicado en:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Página(s) 767-768, ISBN 978-1-4673-7876-5
Editor:
IEEE
DOI:
10.1109/CNS.2015.7346926
Autores:
Patrick Metzler, Habib Saissi, Peter Bokor, Neeraj Suri
Publicado en:
2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017, Página(s) 776-781, ISBN 978-1-5386-2684-9
Editor:
IEEE
DOI:
10.1109/ASE.2017.8115688
Autores:
Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri
Publicado en:
Proc. of USENIX Security Symposium, 2015, Página(s) 801-816
Editor:
USENIX
Autores:
Salman Manzoor, Ahmed Taha, Neeraj Suri
Publicado en:
2016 IEEE Trustcom/BigDataSE/ISPA, 2016, Página(s) 97-104, ISBN 978-1-5090-3205-1
Editor:
IEEE
DOI:
10.1109/TrustCom.2016.0051
Autores:
Stefan Winter, Thorsten Piper, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo
Publicado en:
2015 IEEE/ACM 10th International Workshop on Automation of Software Test, 2015, Página(s) 75-79, ISBN 978-1-4673-7022-6
Editor:
IEEE
DOI:
10.1109/AST.2015.22
Autores:
Ahmed Taha, Patrick Metzler, Ruben Trapero, Jesus Luna, Neeraj Suri
Publicado en:
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16, 2016, Página(s) 329-340, ISBN 9781-450342339
Editor:
ACM Press
DOI:
10.1145/2897845.2897911
Autores:
Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo
Publicado en:
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, 2015, Página(s) 494-505, ISBN 978-1-4799-1934-5
Editor:
IEEE
DOI:
10.1109/ICSE.2015.67
Autores:
Florian Kerschbaum
Publicado en:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Página(s) 656-667, ISBN 9781-450338325
Editor:
ACM Press
DOI:
10.1145/2810103.2813629
Autores:
Isabelle Hang, Florian Kerschbaum, Ernesto Damiani
Publicado en:
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data - SIGMOD '15, 2015, Página(s) 183-196, ISBN 9781-450327589
Editor:
ACM Press
DOI:
10.1145/2723372.2749439
Autores:
S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati
Publicado en:
nternational Conference on Cloud Computing and Services, 2017, Página(s) 3-15
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-62594-2_1
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
Publicado en:
A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, 2017, Página(s) 457-472
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-61893-7_27
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
Publicado en:
2015, Página(s) 3-10
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-29883-2_1
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati
Publicado en:
The New Codebreakers, 2016, Página(s) 205-239, ISBN 978-3-662-49301-4
Editor:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-49301-4_15
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
Publicado en:
Information Systems Security, 2015, Página(s) 3-10, ISBN 978-3-319-26961-0
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-26961-0_1
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati
Publicado en:
Handbook on Data Centers, 2015, Página(s) 997-1027, ISBN 978-1-4939-2092-1
Editor:
Springer New York
DOI:
10.1007/978-1-4939-2092-1_33
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
Publicado en:
Data Management in Pervasive Systems, 2015, Página(s) 43-65, ISBN 978-3-319-20062-0
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-20062-0_3
Autores:
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Publicado en:
ICT Systems Security and Privacy Protection, 2015, Página(s) 446-459, ISBN 978-3-319-18467-8
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-18467-8_30
Autores:
Stefano Paraboschi, Enrico Bacis, Simone Mutti
Publicado en:
Information Systems Security, 2015, Página(s) 21-35, ISBN 978-3-319-26961-0
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-26961-0_3
Autores:
Pierangela Samarati, Sabrina De Capitani di Vimercati
Publicado en:
Encyclopedia of Cloud Computing - Murugesan/Encyclopedia of Cloud Computing, 2016, Página(s) 205-219, ISBN 9781-118821930
Editor:
John Wiley & Sons, Ltd
DOI:
10.1002/9781118821930.ch17
Autores:
Pramod S. Pawar, Ali Sajjad, Theo Dimitrakos, David W. Chadwick
Publicado en:
Trust Management IX, 2015, Página(s) 251-261, ISBN 978-3-319-18491-3
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-18491-3_21
Autores:
Joshua Daniel, Fadi El-Moussa, Géry Ducatel, Pramod Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos
Publicado en:
Trust Management IX, 2015, Página(s) 226-239, ISBN 978-3-319-18491-3
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-18491-3_19
Autores:
Florian Kerschbaum, Hoon Wei Lim
Publicado en:
Computer Security -- ESORICS 2015, 2015, Página(s) 81-100, ISBN 978-3-319-24177-7
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-24177-7_5
Autores:
Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu
Publicado en:
Computer Security -- ESORICS 2015, 2015, Página(s) 203-223, ISBN 978-3-319-24174-6
Editor:
Springer International Publishing
DOI:
10.1007/978-3-319-24174-6_11
Buscando datos de OpenAIRE...
Se ha producido un error en la búsqueda de datos de OpenAIRE
No hay resultados disponibles