Author of the publication

Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.

, , , , , , , and . Sicherheit, volume P-228 of LNI, page 115-125. GI, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extended Analysis of Delegating Obligations.. DBSec, volume 144 of IFIP, page 49-64. Kluwer/Springer, (2004)Revocation of Obligation and Authorisation Policy Objects.. DBSec, volume 3654 of Lecture Notes in Computer Science, page 28-39. Springer, (2005)CloudProtect - A Cloud-based Software Protection Service., , and . SACMAT, page 219-221. ACM, (2019)TAM2: automated threat analysis., and . SAC, page 1103-1108. ACM, (2012)XacT: a bridge between resource management and access control in multi-layered applications., , and . SESS@ICSE, page 1-7. ACM, (2005)A Framework for Evidence Lifecycle Management.. WISE Workshops, volume 4832 of Lecture Notes in Computer Science, page 191-200. Springer, (2007)Ontology-Based Secure XML Content Distribution., , , and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 294-306. Springer, (2009)Security and safety of assets in business processes., , and . SAC, page 1667-1673. ACM, (2012)Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles., and . SAC, page 1380-1384. ACM, (2004)A lightweight approach to specification and analysis of role-based access control extensions., and . SACMAT, page 13-22. ACM, (2002)