Stem confidenti$ (all stems)
27 papers:
SIGMOD-2015-KatsipoulakisTG #data type #named- CE-Storm: Confidential Elastic Processing of Data Streams (NRK, CT, EAG, AL, AJL, PKC), pp. 859–864.
VLDB-2014-AlaviZPC #in the cloud #named #performance #query- RASP-QS: Efficient and Confidential Query Services in the Cloud (ZA, LZ, JP, KC), pp. 1685–1688.
DUXU-DI-2014-AlomariM #towards- Towards Data Confidentiality and Portability in Cloud Storage (EAA, MMM), pp. 38–49.
CAV-2014-KanavL0 #documentation- A Conference Management System with Verified Document Confidentiality (SK, PL, AP), pp. 167–183.
VLDB-2014-ChenHX13 #authentication #query- Authenticating Top-k Queries in Location-based Services with Confidentiality (QC, HH, JX), pp. 49–60.
SAC-2013-AbrilNT #documentation #towards- Towards a private vector space model for confidential documents (DA, GNA, VT), pp. 944–945.
DAC-2012-ShojaeiDR #integer #programming- Confidentiality preserving integer programming for global routing (HS, AD, PR), pp. 709–716.
HT-2012-FahlHMS #named #network #social- TrustSplit: usable confidentiality for social network messaging (SF, MH, TM, MS), pp. 145–154.
SIGMOD-2011-BajajS #database #hardware #named #privacy- TrustedDB: a trusted hardware based database with privacy and data confidentiality (SB, RS), pp. 205–216.
FM-2011-BanksJ #specification- Specifying Confidentiality in Circus (MJB, JLJ), pp. 215–230.
SOSP-2011-PopaRZB #named #query- CryptDB: protecting confidentiality with encrypted query processing (RAP, CMSR, NZ, HB), pp. 85–100.
ICLP-2011-MaRBL #abduction #multi #reasoning- Multi-agent Confidential Abductive Reasoning (JM, AR, KB, EL), pp. 175–186.
RE-2010-MoraliW #outsourcing #requirements #specification- Risk-based Confidentiality Requirements Specification for Outsourced IT Systems (AM, RW), pp. 199–208.
RE-2009-Weber-JahnkeO #fault #natural language #requirements- Finding Defects in Natural Language Confidentiality Requirements (JHWJ, AO), pp. 213–222.
CAV-2009-CernyA #analysis #automation #java- Automated Analysis of Java Methods for Confidentiality (PC, RA), pp. 173–187.
SEFM-2008-TschantzW #policy- Extracting Conditional Confidentiality Policies (MCT, JMW), pp. 107–116.
HPCA-2008-RogersYCPS #distributed #memory management #multi- Single-level integrity and confidentiality protection for distributed shared memory multiprocessors (BR, CY, SC, MP, YS), pp. 161–172.
ESOP-2006-YuI #assembly- A Typed Assembly Language for Confidentiality (DY, NI), pp. 162–179.
TestCom-2006-ShuL #monitoring #protocol #security #testing- Message Confidentiality Testing of Security Protocols — Passive Monitoring and Active Checking (GS, DL), pp. 357–372.
CIKM-2005-TanLZLL #performance- Balancing performance and confidentiality in air index (QT, WCL, BZ, PL, DLL), pp. 800–807.
ESEC-FSE-2005-LandtsheerL #reasoning #requirements- Reasoning about confidentiality at requirements engineering time (RDL, AvL), pp. 41–49.
VLDB-2002-BouganimP #data access- Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
QAPL-2001-ClarkHM #analysis- Quantitative Analysis of the Leakage of Confidential Data (DC, SH, PM), pp. 238–251.
PADL-2001-BellaB #analysis #constraints #protocol #security- Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
SOSP-2001-ZdancewicZNM #clustering- Untrusted Hosts and Confidentiality: Secure Program Partitioning (SZ, LZ, NN, ACM), pp. 1–14.
SAS-2000-Feret #analysis #mobile- Confidentiality Analysis of Mobile Systems (JF), pp. 135–154.
HCI-SES-1987-Rahav- Computerization of Psychiatric Case Registers: Public Peril vs. Hazards to Confidentiality (MR), pp. 25–30.