CORDIS oferuje możliwość skorzystania z odnośników do publicznie dostępnych publikacji i rezultatów projektów realizowanych w ramach programów ramowych HORYZONT.
Odnośniki do rezultatów i publikacji związanych z poszczególnymi projektami 7PR, a także odnośniki do niektórych konkretnych kategorii wyników, takich jak zbiory danych i oprogramowanie, są dynamicznie pobierane z systemu OpenAIRE .
Rezultaty
It provides the final version of the security requirements coming from the use cases. (T1.1)
Report on multi cloud and federated cloudIt provides a final version of the techniques designed and implemented in this WP. (T4.*)
Report on secure information sharing in the cloudIt provides the techniques for supporting secure and selective information sharing. (T3.*)
Report on techniques for security testingIt provides the techniques for security testing. (T3.4)
Report on techniques for selective accessIt provides a first version of the techniques for enforcing selective access on outsourced data. (T3.1)
Final evaluation report from use casesIt reports on the assessment and evaluation of the techniques and tools available in WPs2–4 with respect to the satisfaction of the security requirements of the use cases. (T1.4)
Report on research alignment and deployment statusIt reports on the status about the alignment between the research and technological development in WPs24 and the requirements of the use cases T12
First report on multi cloud and federated cloudIt provides a first version of the protection techniques that leverage multiple providers. (T4.*)
First report on security metrics and assessmentIt provides a formal definition of the security metrics that can be used to characterise the guarantees offered by different providers T41
Report on data protection techniquesIt provides a first version of the data protection techniques designed in the WP T2
Report on requirement-based threat analysisIt provides techniques for estimating risks based on requirementbased threat analysis T24
Report on data and access protectionIt provides an extension of the protection techniques presented in D21 T2
Final report on data protection and key management solutionsIt illustrates the complete techniques for protecting data and accesses and for key management. (T2.*)
Final version of data management planIt provides the final detailed description of the data management plan T61
Report on techniques for selective and secure data sharingIt provides techniques for ensuring collaborative access to data while ensuring the confidentiality and integrity of data and processes T3
First version of requirements from the use casesIt provides a first version of the security requirements coming from the use cases T11
It provides a detailed description of the data management plan. (T6.1)
It provides the prototype applications for the use cases leveraging the tools in W13W16 T13
Tools for selective and private multi-user queries and interactionsIt provides tools for supporting the private collaborative execution of queries. (T3.3)
Final versions of tools for security with multiple providersIt provides the tools implementing the protection techniques developed in this WP T4
Tools for protecting confidentiality and integrity of data and accessIt provides a first version of the tools developed for protecting the confidentiality and integrity of outsourced data and their accesses. (T2.1, T2.3)
Final tools for the protection of integrity and confidentiality of data and accessIt provides the final version of the tools developed for protecting the confidentiality and integrity of outsourced data and their accesses according to the findings in D23 T21 T23
Publikacje
Autorzy:
Jolanda Modic, Ruben Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri
Opublikowane w:
Computers & Security, Numer 62, 2016, Strona(/y) 1-18, ISSN 0167-4048
Wydawca:
Pergamon Press Ltd.
DOI:
10.1016/j.cose.2016.06.003
Autorzy:
Marcus Brandenburger, Christian Cachin, Nikola Knežević
Opublikowane w:
ACM Transactions on Privacy and Security, Numer 20/3, 2017, Strona(/y) 1-30, ISSN 2471-2566
Wydawca:
ACM Press
DOI:
10.1145/3079762
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
Opublikowane w:
Journal of Computer Security, Numer 26/2, 2018, Strona(/y) 143-175, ISSN 0926-227X
Wydawca:
IOS Press
DOI:
10.3233/JCS-171004
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
Opublikowane w:
Proceedings of the VLDB Endowment, Numer 11/3, 2017, Strona(/y) 256-268, ISSN 2150-8097
Wydawca:
VLDB
DOI:
10.14778/3157794.3157796
Autorzy:
SABRINA DE CAPITANI DI VIMERCATI, Sara Foresti, Giovanni Livraga, Vincenzo Piuri, Pierangela Samarati
Opublikowane w:
IEEE Transactions on Services Computing, 2017, Strona(/y) 1-1, ISSN 1939-1374
Wydawca:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TSC.2017.2777977
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Opublikowane w:
Journal of Computer Security, Numer 24/3, 2016, Strona(/y) 347-378, ISSN 0926-227X
Wydawca:
IOS Press
DOI:
10.3233/JCS-160545
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
Opublikowane w:
IEEE Transactions on Cloud Computing, 2015, Strona(/y) 1-1, ISSN 2168-7161
Wydawca:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/TCC.2015.2449993
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
Opublikowane w:
Journal of Computer Security, Numer 23/1, 2015, Strona(/y) 59-88, ISSN 0926-227X
Wydawca:
IOS Press
DOI:
10.3233/JCS-140513
Autorzy:
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
Opublikowane w:
ACM Transactions on Storage, Numer 11/4, 2015, Strona(/y) 1-55, ISSN 1553-3077
Wydawca:
Association for Computing Machinary, Inc.
DOI:
10.1145/2747878
Autorzy:
Ruben Trapero, Jolanda Modic, Miha Stopar, Ahmed Taha, Neeraj Suri
Opublikowane w:
Future Generation Computer Systems, Numer 72, 2017, Strona(/y) 193-205, ISSN 0167-739X
Wydawca:
Elsevier BV
DOI:
10.1016/j.future.2016.06.004
Autorzy:
Jesus Luna, Neeraj Suri, Michaela Iorga, Anil Karmel
Opublikowane w:
IEEE Cloud Computing, Numer 2/3, 2015, Strona(/y) 32-40, ISSN 2325-6095
Wydawca:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/MCC.2015.52
Autorzy:
Jesus Luna, Ahmed Taha, Ruben Trapero, Neeraj Suri
Opublikowane w:
IEEE Transactions on Cloud Computing, 2015, Strona(/y) 1-1, ISSN 2168-7161
Wydawca:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/TCC.2015.2469659
Autorzy:
Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
Opublikowane w:
IACR ePrint Archive, 2017
Wydawca:
IACR
Autorzy:
Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rudiger Kapitza
Opublikowane w:
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Strona(/y) 157-168, ISBN 978-1-5386-0542-4
Wydawca:
IEEE
DOI:
10.1109/DSN.2017.45
Autorzy:
Christian Cachin
Opublikowane w:
2017 13th European Dependable Computing Conference (EDCC), 2017, Strona(/y) 1-2, ISBN 978-1-5386-0602-5
Wydawca:
IEEE
DOI:
10.1109/EDCC.2017.36
Autorzy:
Christian Cachin, Marko Vukolić
Opublikowane w:
31st International Symposium on Distributed Computing (DISC 2017), 2017, ISBN 978-3-95977-053-8
Wydawca:
LIPIcs
DOI:
10.4230/LIPIcs.DISC.2017.1
Autorzy:
Mathias Björkqvist, Christian Cachin, Felix Engelmann, Alessandro Sorniotti
Opublikowane w:
IEEE International Conference in Cloud Engineering, 2018
Wydawca:
IEEE Press
Autorzy:
Anselme Kemgne Tueno, Florian Kerschbaum, Daniel Bernau, Sara Foresti
Opublikowane w:
Workshop on Security and Privacy in the Cloud, 2017
Wydawca:
IEEE
Autorzy:
Marcus Brandenburger, Christian Cachin, Nikola Knežević
Opublikowane w:
Proceedings of the 8th ACM International Systems and Storage Conference on - SYSTOR '15, 2015, Strona(/y) 1-11, ISBN 9781-450336079
Wydawca:
ACM Press
DOI:
10.1145/2757667.2757681
Autorzy:
Anselme Tueno, Florian Kerschbaum, Daniel Bernau, Sara Foresti
Opublikowane w:
2017 IEEE Conference on Communications and Network Security (CNS), 2017, Strona(/y) 476-482, ISBN 978-1-5386-0683-4
Wydawca:
IEEE
DOI:
10.1109/CNS.2017.8228710
Autorzy:
Enrico Bacis, Alan Barnett, Andrew Byrne, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
Opublikowane w:
2017 IEEE Conference on Communications and Network Security (CNS), 2017, Strona(/y) 396-397, ISBN 978-1-5386-0683-4
Wydawca:
IEEE
DOI:
10.1109/CNS.2017.8228695
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Riccardo Moretti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
Opublikowane w:
2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Strona(/y) 391-398, ISBN 978-1-5090-1445-3
Wydawca:
IEEE
DOI:
10.1109/CloudCom.2016.0068
Autorzy:
Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
Opublikowane w:
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), 2017, Strona(/y) 139-144, ISBN 978-1-5090-6644-5
Wydawca:
IEEE
DOI:
10.1109/CSCloud.2017.25
Autorzy:
Ala Arman, Sara Foresti, Giovanni Livraga, Pierangela Samarati
Opublikowane w:
2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), 2016, Strona(/y) 1-6, ISBN 978-1-5090-1131-5
Wydawca:
IEEE
DOI:
10.1109/RTSI.2016.7740642
Autorzy:
Sabrina De Capitani di Vimercati, Giovanni Livraga, Vincenzo Piuri
Opublikowane w:
2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), 2016, Strona(/y) 1-4, ISBN 978-1-5090-1131-5
Wydawca:
IEEE
DOI:
10.1109/RTSI.2016.7740622
Autorzy:
Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
Opublikowane w:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Strona(/y) 217-228, ISBN 9781-450341394
Wydawca:
ACM Press
DOI:
10.1145/2976749.2978377
Autorzy:
Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
Opublikowane w:
2016, Strona(/y) 353-372
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-59608-2_21
Autorzy:
Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Daniele Guttadoro, Stefano Paraboschi, Marco Rosa, Pierangela Samarati, Alessandro Saullo
Opublikowane w:
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security - WISCS'16, 2016, Strona(/y) 39-48, ISBN 9781-450345651
Wydawca:
ACM Press
DOI:
10.1145/2994539.2994549
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
Opublikowane w:
2016, Strona(/y) 130-147
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-41483-6_10
Autorzy:
Gery Ducatel
Opublikowane w:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Strona(/y) 675-679, ISBN 978-1-4673-7876-5
Wydawca:
IEEE
DOI:
10.1109/CNS.2015.7346886
Autorzy:
Enrico Bacis, Marco Rosa, Ali Sajjad
Opublikowane w:
2017 IEEE Conference on Communications and Network Security (CNS), 2017, Strona(/y) 483-486, ISBN 978-1-5386-0683-4
Wydawca:
IEEE
DOI:
10.1109/CNS.2017.8228711
Autorzy:
Enrico Bacis, Simone Mutti, Steven Capelli, Stefano Paraboschi
Opublikowane w:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Strona(/y) 749-750, ISBN 978-1-4673-7876-5
Wydawca:
IEEE
DOI:
10.1109/CNS.2015.7346917
Autorzy:
Simone Mutti, Enrico Bacis, Stefano Paraboschi
Opublikowane w:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Strona(/y) 747-748, ISBN 978-1-4673-7876-5
Wydawca:
IEEE
DOI:
10.1109/CNS.2015.7346916
Autorzy:
Simone Mutti, Enrico Bacis, Stefano Paraboschi
Opublikowane w:
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense - SafeConfig '15, 2015, Strona(/y) 33-38, ISBN 9781-450338219
Wydawca:
ACM Press
DOI:
10.1145/2809826.2809832
Autorzy:
Enrico Bacis, Simone Mutti, Stefano Paraboschi
Opublikowane w:
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15, 2015, Strona(/y) 309-320, ISBN 9781-450332453
Wydawca:
ACM Press
DOI:
10.1145/2714576.2714626
Autorzy:
Simone Mutti, Enrico Bacis, Stefano Paraboschi
Opublikowane w:
Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015, 2015, Strona(/y) 411-420, ISBN 9781-450336826
Wydawca:
ACM Press
DOI:
10.1145/2818000.2818041
Autorzy:
Sabrina De Capitani di Vimercati, Giovanni Livraga, Vincenzo Piuri, Pierangela Samarati, Gerson A. Soares
Opublikowane w:
Proceedings of the International Conference on Internet of Things and Big Data, 2016, Strona(/y) 65-72, ISBN 978-989-758-183-0
Wydawca:
SCITEPRESS - Science and and Technology Publications
DOI:
10.5220/0005877000650072
Autorzy:
Quang Hieu Vu, Maurizio Colombo, Rasool Asal, Ali Sajjad, Fadi Ali El-Moussa, Theo Dimitrakos
Opublikowane w:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Strona(/y) 638-642, ISBN 978-1-4673-7876-5
Wydawca:
IEEE
DOI:
10.1109/CNS.2015.7346879
Autorzy:
Abraham Chan, Stefan Winter, Habib Saissi, Karthik Pattabiraman, Neeraj Suri
Opublikowane w:
2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), Numer Annual, 2017, Strona(/y) 184-195, ISBN 978-1-5090-6031-3
Wydawca:
IEEE
DOI:
10.1109/ICST.2017.24
Autorzy:
Benny Fuhry, Walter Tighzert, Florian Kerschbaum
Opublikowane w:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Strona(/y) 35-46, ISBN 9781-450345729
Wydawca:
ACM Press
DOI:
10.1145/2996429.2996438
Autorzy:
Florian Hahn, Florian Kerschbaum
Opublikowane w:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Strona(/y) 23-34, ISBN 9781-450345729
Wydawca:
ACM Press
DOI:
10.1145/2996429.2996437
Autorzy:
Soha Albaghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri
Opublikowane w:
Proc. of ARES (Availability, Reliability and Security) 2017, 2017
Wydawca:
ACM
DOI:
10.1145/3098954.3098967
Autorzy:
Ahmed Taha, Ruben Trapero, Jesus Luna, Neeraj Suri
Opublikowane w:
Proc. of Service Computing (SCC), 2017, Numer Yearly, 2017, Strona(/y) 322-329
Wydawca:
IEEE
DOI:
10.1109/SCC.2017.48
Autorzy:
Salman Manzoor, Jesus Luna and Neeraj Suri
Opublikowane w:
Proc of Service Computing (SCC), 2017, Numer Yearly, 2017, Strona(/y) 499-502
Wydawca:
IEEE
DOI:
10.1109/SCC.2017.74
Autorzy:
Heng Zhang, Jesus Luna, Ruben Trapero and Neeraj Suri
Opublikowane w:
Proc of Service Computing (SCC) 2017, Numer Yearly, 2017, Strona(/y) 27-34
Wydawca:
IEEE
DOI:
10.1109/SCC.2017.13
Autorzy:
Ahmed Taha, Salman Manzoor and Neeraj Suri
Opublikowane w:
Proc of EDGE 2017, Numer Yearly, 2017, Strona(/y) 65-72
Wydawca:
IEEE
DOI:
10.1109/IEEE.EDGE.2017.17
Autorzy:
Sara Foresti, Vincenzo Piuri, Gerson A. Soares
Opublikowane w:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Strona(/y) 767-768, ISBN 978-1-4673-7876-5
Wydawca:
IEEE
DOI:
10.1109/CNS.2015.7346926
Autorzy:
Patrick Metzler, Habib Saissi, Peter Bokor, Neeraj Suri
Opublikowane w:
2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017, Strona(/y) 776-781, ISBN 978-1-5386-2684-9
Wydawca:
IEEE
DOI:
10.1109/ASE.2017.8115688
Autorzy:
Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri
Opublikowane w:
Proc. of USENIX Security Symposium, 2015, Strona(/y) 801-816
Wydawca:
USENIX
Autorzy:
Salman Manzoor, Ahmed Taha, Neeraj Suri
Opublikowane w:
2016 IEEE Trustcom/BigDataSE/ISPA, 2016, Strona(/y) 97-104, ISBN 978-1-5090-3205-1
Wydawca:
IEEE
DOI:
10.1109/TrustCom.2016.0051
Autorzy:
Stefan Winter, Thorsten Piper, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo
Opublikowane w:
2015 IEEE/ACM 10th International Workshop on Automation of Software Test, 2015, Strona(/y) 75-79, ISBN 978-1-4673-7022-6
Wydawca:
IEEE
DOI:
10.1109/AST.2015.22
Autorzy:
Ahmed Taha, Patrick Metzler, Ruben Trapero, Jesus Luna, Neeraj Suri
Opublikowane w:
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16, 2016, Strona(/y) 329-340, ISBN 9781-450342339
Wydawca:
ACM Press
DOI:
10.1145/2897845.2897911
Autorzy:
Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo
Opublikowane w:
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, 2015, Strona(/y) 494-505, ISBN 978-1-4799-1934-5
Wydawca:
IEEE
DOI:
10.1109/ICSE.2015.67
Autorzy:
Florian Kerschbaum
Opublikowane w:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Strona(/y) 656-667, ISBN 9781-450338325
Wydawca:
ACM Press
DOI:
10.1145/2810103.2813629
Autorzy:
Isabelle Hang, Florian Kerschbaum, Ernesto Damiani
Opublikowane w:
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data - SIGMOD '15, 2015, Strona(/y) 183-196, ISBN 9781-450327589
Wydawca:
ACM Press
DOI:
10.1145/2723372.2749439
Autorzy:
S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati
Opublikowane w:
nternational Conference on Cloud Computing and Services, 2017, Strona(/y) 3-15
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-62594-2_1
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
Opublikowane w:
A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, 2017, Strona(/y) 457-472
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-61893-7_27
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
Opublikowane w:
2015, Strona(/y) 3-10
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-29883-2_1
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati
Opublikowane w:
The New Codebreakers, 2016, Strona(/y) 205-239, ISBN 978-3-662-49301-4
Wydawca:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-49301-4_15
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
Opublikowane w:
Information Systems Security, 2015, Strona(/y) 3-10, ISBN 978-3-319-26961-0
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-26961-0_1
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati
Opublikowane w:
Handbook on Data Centers, 2015, Strona(/y) 997-1027, ISBN 978-1-4939-2092-1
Wydawca:
Springer New York
DOI:
10.1007/978-1-4939-2092-1_33
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
Opublikowane w:
Data Management in Pervasive Systems, 2015, Strona(/y) 43-65, ISBN 978-3-319-20062-0
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-20062-0_3
Autorzy:
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Opublikowane w:
ICT Systems Security and Privacy Protection, 2015, Strona(/y) 446-459, ISBN 978-3-319-18467-8
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-18467-8_30
Autorzy:
Stefano Paraboschi, Enrico Bacis, Simone Mutti
Opublikowane w:
Information Systems Security, 2015, Strona(/y) 21-35, ISBN 978-3-319-26961-0
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-26961-0_3
Autorzy:
Pierangela Samarati, Sabrina De Capitani di Vimercati
Opublikowane w:
Encyclopedia of Cloud Computing - Murugesan/Encyclopedia of Cloud Computing, 2016, Strona(/y) 205-219, ISBN 9781-118821930
Wydawca:
John Wiley & Sons, Ltd
DOI:
10.1002/9781118821930.ch17
Autorzy:
Pramod S. Pawar, Ali Sajjad, Theo Dimitrakos, David W. Chadwick
Opublikowane w:
Trust Management IX, 2015, Strona(/y) 251-261, ISBN 978-3-319-18491-3
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-18491-3_21
Autorzy:
Joshua Daniel, Fadi El-Moussa, Géry Ducatel, Pramod Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos
Opublikowane w:
Trust Management IX, 2015, Strona(/y) 226-239, ISBN 978-3-319-18491-3
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-18491-3_19
Autorzy:
Florian Kerschbaum, Hoon Wei Lim
Opublikowane w:
Computer Security -- ESORICS 2015, 2015, Strona(/y) 81-100, ISBN 978-3-319-24177-7
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-24177-7_5
Autorzy:
Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu
Opublikowane w:
Computer Security -- ESORICS 2015, 2015, Strona(/y) 203-223, ISBN 978-3-319-24174-6
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-24174-6_11
Wyszukiwanie danych OpenAIRE...
Podczas wyszukiwania danych OpenAIRE wystąpił błąd
Brak wyników