Stem confidenti$ (all stems)
27 papers:
- SIGMOD-2015-KatsipoulakisTG #data type #named
- CE-Storm: Confidential Elastic Processing of Data Streams (NRK, CT, EAG, AL, AJL, PKC), pp. 859–864.
- VLDB-2014-AlaviZPC #in the cloud #named #performance #query
- RASP-QS: Efficient and Confidential Query Services in the Cloud (ZA, LZ, JP, KC), pp. 1685–1688.
- DUXU-DI-2014-AlomariM #towards
- Towards Data Confidentiality and Portability in Cloud Storage (EAA, MMM), pp. 38–49.
- CAV-2014-KanavL0 #documentation
- A Conference Management System with Verified Document Confidentiality (SK, PL, AP), pp. 167–183.
- VLDB-2014-ChenHX13 #authentication #query
- Authenticating Top-k Queries in Location-based Services with Confidentiality (QC, HH, JX), pp. 49–60.
- SAC-2013-AbrilNT #documentation #towards
- Towards a private vector space model for confidential documents (DA, GNA, VT), pp. 944–945.
- DAC-2012-ShojaeiDR #integer #programming
- Confidentiality preserving integer programming for global routing (HS, AD, PR), pp. 709–716.
- HT-2012-FahlHMS #named #network #social
- TrustSplit: usable confidentiality for social network messaging (SF, MH, TM, MS), pp. 145–154.
- SIGMOD-2011-BajajS #database #hardware #named #privacy
- TrustedDB: a trusted hardware based database with privacy and data confidentiality (SB, RS), pp. 205–216.
- FM-2011-BanksJ #specification
- Specifying Confidentiality in Circus (MJB, JLJ), pp. 215–230.
- SOSP-2011-PopaRZB #named #query
- CryptDB: protecting confidentiality with encrypted query processing (RAP, CMSR, NZ, HB), pp. 85–100.
- ICLP-2011-MaRBL #abduction #multi #reasoning
- Multi-agent Confidential Abductive Reasoning (JM, AR, KB, EL), pp. 175–186.
- RE-2010-MoraliW #outsourcing #requirements #specification
- Risk-based Confidentiality Requirements Specification for Outsourced IT Systems (AM, RW), pp. 199–208.
- RE-2009-Weber-JahnkeO #fault #natural language #requirements
- Finding Defects in Natural Language Confidentiality Requirements (JHWJ, AO), pp. 213–222.
- CAV-2009-CernyA #analysis #automation #java
- Automated Analysis of Java Methods for Confidentiality (PC, RA), pp. 173–187.
- SEFM-2008-TschantzW #policy
- Extracting Conditional Confidentiality Policies (MCT, JMW), pp. 107–116.
- HPCA-2008-RogersYCPS #distributed #memory management #multi
- Single-level integrity and confidentiality protection for distributed shared memory multiprocessors (BR, CY, SC, MP, YS), pp. 161–172.
- ESOP-2006-YuI #assembly
- A Typed Assembly Language for Confidentiality (DY, NI), pp. 162–179.
- TestCom-2006-ShuL #monitoring #protocol #security #testing
- Message Confidentiality Testing of Security Protocols — Passive Monitoring and Active Checking (GS, DL), pp. 357–372.
- CIKM-2005-TanLZLL #performance
- Balancing performance and confidentiality in air index (QT, WCL, BZ, PL, DLL), pp. 800–807.
- ESEC-FSE-2005-LandtsheerL #reasoning #requirements
- Reasoning about confidentiality at requirements engineering time (RDL, AvL), pp. 41–49.
- VLDB-2002-BouganimP #data access
- Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
- QAPL-2001-ClarkHM #analysis
- Quantitative Analysis of the Leakage of Confidential Data (DC, SH, PM), pp. 238–251.
- PADL-2001-BellaB #analysis #constraints #protocol #security
- Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
- SOSP-2001-ZdancewicZNM #clustering
- Untrusted Hosts and Confidentiality: Secure Program Partitioning (SZ, LZ, NN, ACM), pp. 1–14.
- SAS-2000-Feret #analysis #mobile
- Confidentiality Analysis of Mobile Systems (JF), pp. 135–154.
- HCI-SES-1987-Rahav
- Computerization of Psychiatric Case Registers: Public Peril vs. Hazards to Confidentiality (MR), pp. 25–30.