Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
44
views
24
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,209
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Foundations and Practice of Security: 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers
Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model
other
Author(s):
Eugenia I. Papagiannakopoulou
,
Maria N. Koukovini
,
Georgios V. Lioudakis
,
Nikolaos Dellas
,
Joaquin Garcia-Alfaro
,
Dimitra I. Kaklamani
,
Iakovos S. Venieris
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
Publication date
(Online):
March 21 2014
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Most cited references
24
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Ciphertext-Policy Attribute-Based Encryption
Brent Waters
,
Amit Sahai
,
John Bethencourt
(2007)
0
comments
Cited
274
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Role-based access control models
R.S. Sandhu
,
E.J. Coyne
,
H.L. Feinstein
…
(1996)
0
comments
Cited
232
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Attributed based access control (ABAC) for Web services
E. Yuan
,
J. Tong
(2005)
0
comments
Cited
26
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Publication date (Online):
March 21 2014
Pages
: 209-226
DOI:
10.1007/978-3-319-05302-8_13
SO-VID:
4e0a9e2f-ec47-4363-a6a7-103574b25eb5
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case
pp. 19
On the Feasibility of a Censorship Resistant Decentralized Name System
pp. 31
A General Framework for Group Authentication and Key Exchange Protocols
pp. 46
Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange
pp. 65
Model-Based Specification and Validation of Security and Dependability Patterns
pp. 83
Enforcing Information Flow by Combining Static and Dynamic Analysis
pp. 105
Fault Injection to Reverse Engineer DES-Like Cryptosystems
pp. 122
Software Camouflage
pp. 140
Investigation of Parameters Influencing the Success of Optical Fault Attacks
pp. 161
ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework
pp. 178
Quantitative Evaluation of Enforcement Strategies
pp. 189
Collusion Resistant Inference Control for Cadastral Databases
pp. 209
Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model
pp. 227
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations
pp. 247
Computational Soundness of Symbolic Blind Signatures under Active Attacker
pp. 264
Improved Davies-Murphy’s Attack on DES Revisited
pp. 272
Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts
pp. 291
A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs
pp. 306
A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks
pp. 323
On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs
pp. 339
CheR: Cheating Resilience in the Cloud via Smart Resource Allocation
pp. 353
Evaluation of Software-Oriented Block Ciphers on Smartphones
pp. 369
Don’t Push It: Breaking iButton Security
pp. 391
Discovering Flaws in IDS Through Analysis of Their Inputs
pp. 426
The Carna Botnet Through the Lens of a Network Telescope
Similar content
3,209
A Holistic Approach to Multilingual Education: Introduction
Authors:
JASONE CENOZ
,
Durk Gorter
Developing a Wine Experience Scale: A New Strategy to Measure Holistic Behaviour of Wine Tourists
Authors:
Vasco Santos
,
Paulo. RAMOS
,
Nuno Almeida
…
Development and Evaluation of a Holistic and Mechanistic Modeling Framework for Chemical Emissions, Fate, Exposure, and Risk
Authors:
Li Li
,
Alessandro Sangion
,
Frank Wania
…
See all similar