http://www.cnr.it/ontology/cnr/individuo/prodotto/ID220424
Risk-Based Security Decisions Under Uncertainty (Contributo in atti di convegno)
- Type
- Label
- Risk-Based Security Decisions Under Uncertainty (Contributo in atti di convegno) (literal)
- Anno
- 2012-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1145/2133601.2133622 (literal)
- Alternative label
Morisset Charles, Molloy Ian, Dickens Luke, Cheng Pau-Chen, Lobo Jorge, Russo Alessandra (2012)
Risk-Based Security Decisions Under Uncertainty
in 2nd ACM Conference on Data and Application Security and Privacy, CODASPY'12, San Antonio, TX; United States, 7-9 February 2012
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- Morisset Charles, Molloy Ian, Dickens Luke, Cheng Pau-Chen, Lobo Jorge, Russo Alessandra (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#altreInformazioni
- ID_PUMA; /cnr.iit/2012-A2-048 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#titoloVolume
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
- Note
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- CNR-IIT, Pisa, Italy; IBM Research TJ Watson, NY, USA; Imperial College, London, Great Britain; IBM Research TJ Watson, NY, USA; IBM Research TJ Watson, NY, USA; Imperial College, London, Great Britain (literal)
- Titolo
- Risk-Based Security Decisions Under Uncertainty (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
- 978-1-4503-1091-8 (literal)
- Abstract
- The proceedings contain 31 papers. The topics discussed include: secure and efficient proof of storage with deduplication; measuring query privacy in location-based services; deriving implementation-level policies for usage control enforcement; discovering access-control misconfigurations: new approaches and evaluation methodologies; comparison-based encryption for fine-grained access control in clouds; relationship-based access control: its expression and enforcement through hybrid logic; bounding trust in reputation systems with incomplete information; cookie-based privacy issues on Google services; refinement-based design of a group-centric secure information sharing model; risk-based security decisions under uncertainty; quantitative access control with partially-observable Markov decision processes; role engineering: from theory to practice; and privacy streamliner: a two-stage approach to improving algorithm efficiency. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Editore di
- Insieme di parole chiave di