Risk-Based Security Decisions Under Uncertainty (Contributo in atti di convegno)

Type
Label
  • Risk-Based Security Decisions Under Uncertainty (Contributo in atti di convegno) (literal)
Anno
  • 2012-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1145/2133601.2133622 (literal)
Alternative label
  • Morisset Charles, Molloy Ian, Dickens Luke, Cheng Pau-Chen, Lobo Jorge, Russo Alessandra (2012)
    Risk-Based Security Decisions Under Uncertainty
    in 2nd ACM Conference on Data and Application Security and Privacy, CODASPY'12, San Antonio, TX; United States, 7-9 February 2012
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Morisset Charles, Molloy Ian, Dickens Luke, Cheng Pau-Chen, Lobo Jorge, Russo Alessandra (literal)
Pagina inizio
  • 157 (literal)
Pagina fine
  • 158 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#altreInformazioni
  • ID_PUMA; /cnr.iit/2012-A2-048 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#titoloVolume
  • CODASPY'12 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
  • 2 (literal)
Note
  • Scopu (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • CNR-IIT, Pisa, Italy; IBM Research TJ Watson, NY, USA; Imperial College, London, Great Britain; IBM Research TJ Watson, NY, USA; IBM Research TJ Watson, NY, USA; Imperial College, London, Great Britain (literal)
Titolo
  • Risk-Based Security Decisions Under Uncertainty (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 978-1-4503-1091-8 (literal)
Abstract
  • The proceedings contain 31 papers. The topics discussed include: secure and efficient proof of storage with deduplication; measuring query privacy in location-based services; deriving implementation-level policies for usage control enforcement; discovering access-control misconfigurations: new approaches and evaluation methodologies; comparison-based encryption for fine-grained access control in clouds; relationship-based access control: its expression and enforcement through hybrid logic; bounding trust in reputation systems with incomplete information; cookie-based privacy issues on Google services; refinement-based design of a group-centric secure information sharing model; risk-based security decisions under uncertainty; quantitative access control with partially-observable Markov decision processes; role engineering: from theory to practice; and privacy streamliner: a two-stage approach to improving algorithm efficiency. (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Editore di
Insieme di parole chiave di
data.CNR.it