BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
data (6)
analysi (4)
secur (4)
base (3)
trust (3)

Stem confidenti$ (all stems)

27 papers:

SIGMODSIGMOD-2015-KatsipoulakisTG #data type #named
CE-Storm: Confidential Elastic Processing of Data Streams (NRK, CT, EAG, AL, AJL, PKC), pp. 859–864.
VLDBVLDB-2014-AlaviZPC #in the cloud #named #performance #query
RASP-QS: Efficient and Confidential Query Services in the Cloud (ZA, LZ, JP, KC), pp. 1685–1688.
HCIDUXU-DI-2014-AlomariM #towards
Towards Data Confidentiality and Portability in Cloud Storage (EAA, MMM), pp. 38–49.
CAVCAV-2014-KanavL0 #documentation
A Conference Management System with Verified Document Confidentiality (SK, PL, AP), pp. 167–183.
VLDBVLDB-2014-ChenHX13 #authentication #query
Authenticating Top-k Queries in Location-based Services with Confidentiality (QC, HH, JX), pp. 49–60.
SACSAC-2013-AbrilNT #documentation #towards
Towards a private vector space model for confidential documents (DA, GNA, VT), pp. 944–945.
DACDAC-2012-ShojaeiDR #integer #programming
Confidentiality preserving integer programming for global routing (HS, AD, PR), pp. 709–716.
HTHT-2012-FahlHMS #named #network #social
TrustSplit: usable confidentiality for social network messaging (SF, MH, TM, MS), pp. 145–154.
SIGMODSIGMOD-2011-BajajS #database #hardware #named #privacy
TrustedDB: a trusted hardware based database with privacy and data confidentiality (SB, RS), pp. 205–216.
FMFM-2011-BanksJ #specification
Specifying Confidentiality in Circus (MJB, JLJ), pp. 215–230.
SOSPSOSP-2011-PopaRZB #named #query
CryptDB: protecting confidentiality with encrypted query processing (RAP, CMSR, NZ, HB), pp. 85–100.
ICLPICLP-2011-MaRBL #abduction #multi #reasoning
Multi-agent Confidential Abductive Reasoning (JM, AR, KB, EL), pp. 175–186.
RERE-2010-MoraliW #outsourcing #requirements #specification
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems (AM, RW), pp. 199–208.
RERE-2009-Weber-JahnkeO #fault #natural language #requirements
Finding Defects in Natural Language Confidentiality Requirements (JHWJ, AO), pp. 213–222.
CAVCAV-2009-CernyA #analysis #automation #java
Automated Analysis of Java Methods for Confidentiality (PC, RA), pp. 173–187.
SEFMSEFM-2008-TschantzW #policy
Extracting Conditional Confidentiality Policies (MCT, JMW), pp. 107–116.
HPCAHPCA-2008-RogersYCPS #distributed #memory management #multi
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors (BR, CY, SC, MP, YS), pp. 161–172.
ESOPESOP-2006-YuI #assembly
A Typed Assembly Language for Confidentiality (DY, NI), pp. 162–179.
ICTSSTestCom-2006-ShuL #monitoring #protocol #security #testing
Message Confidentiality Testing of Security Protocols — Passive Monitoring and Active Checking (GS, DL), pp. 357–372.
CIKMCIKM-2005-TanLZLL #performance
Balancing performance and confidentiality in air index (QT, WCL, BZ, PL, DLL), pp. 800–807.
ESEC-FSEESEC-FSE-2005-LandtsheerL #reasoning #requirements
Reasoning about confidentiality at requirements engineering time (RDL, AvL), pp. 41–49.
VLDBVLDB-2002-BouganimP #data access
Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
QAPLQAPL-2001-ClarkHM #analysis
Quantitative Analysis of the Leakage of Confidential Data (DC, SH, PM), pp. 238–251.
PADLPADL-2001-BellaB #analysis #constraints #protocol #security
Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
SOSPSOSP-2001-ZdancewicZNM #clustering
Untrusted Hosts and Confidentiality: Secure Program Partitioning (SZ, LZ, NN, ACM), pp. 1–14.
SASSAS-2000-Feret #analysis #mobile
Confidentiality Analysis of Mobile Systems (JF), pp. 135–154.
HCIHCI-SES-1987-Rahav
Computerization of Psychiatric Case Registers: Public Peril vs. Hazards to Confidentiality (MR), pp. 25–30.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.