Search dblp for Publications

export results for "toc:db/conf/codaspy/codaspy2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/codaspy/BilogrevicJHAN11,
  author       = {Igor Bilogrevic and
                  Murtuza Jadliwala and
                  Jean{-}Pierre Hubaux and
                  Imad Aad and
                  Valtteri Niemi},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Privacy-preserving activity scheduling on mobile devices},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {261--272},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943549},
  doi          = {10.1145/1943513.1943549},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/BilogrevicJHAN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BrancikG11,
  author       = {Kenneth Brancik and
                  Gabriel Ghinita},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {The optimization of situational awareness for insider threat detection},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {231--236},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943544},
  doi          = {10.1145/1943513.1943544},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/BrancikG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/CadenheadKKT11,
  author       = {Tyrone Cadenhead and
                  Vaibhav Khadilkar and
                  Murat Kantarcioglu and
                  Bhavani Thuraisingham},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {A language for provenance access control},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {133--144},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943532},
  doi          = {10.1145/1943513.1943532},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/CadenheadKKT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/CarminatiFMT11,
  author       = {Barbara Carminati and
                  Elena Ferrari and
                  Sandro Morasca and
                  Davide Taibi},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {A probability-based approach to modeling the risk of unauthorized
                  propagation of information in on-line social networks},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943522},
  doi          = {10.1145/1943513.1943522},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/CarminatiFMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChenKG11,
  author       = {Keke Chen and
                  Ramakanth Kavuluru and
                  Shumin Guo},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {{RASP:} efficient multidimensional range query on attack-resilient
                  encrypted databases},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {249--260},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943547},
  doi          = {10.1145/1943513.1943547},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChenKG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChenM11,
  author       = {You Chen and
                  Bradley A. Malin},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Detection of anomalous insiders in collaborative environments via
                  relational analysis of access logs},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {63--74},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943524},
  doi          = {10.1145/1943513.1943524},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChenM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ContiHC11,
  author       = {Mauro Conti and
                  Arbnor Hasani and
                  Bruno Crispo},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Virtual private social networks},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943521},
  doi          = {10.1145/1943513.1943521},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ContiHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Dickson11,
  author       = {John B. Dickson},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Software security: is ok good enough?},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {25--26},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943518},
  doi          = {10.1145/1943513.1943518},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Dickson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Fong11,
  author       = {Philip W. L. Fong},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Relationship-based access control: protection model and policy language},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {191--202},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943539},
  doi          = {10.1145/1943513.1943539},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Fong11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GoodrichK11,
  author       = {Michael T. Goodrich and
                  Florian Kerschbaum},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Privacy-enhanced reputation-feedback methods to reduce feedback extortion
                  in online auctions},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {273--282},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943550},
  doi          = {10.1145/1943513.1943550},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GoodrichK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JafariFSBS11,
  author       = {Mohammad Jafari and
                  Philip W. L. Fong and
                  Reihaneh Safavi{-}Naini and
                  Ken Barker and
                  Nicholas Paul Sheppard},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Towards defining semantic foundations for purpose-based privacy policies},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {213--224},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943541},
  doi          = {10.1145/1943513.1943541},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/JafariFSBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JahidGHO11,
  author       = {Sonia Jahid and
                  Carl A. Gunter and
                  Imranul Hoque and
                  Hamed Okhravi},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {MyABDAC: compiling {XACML} policies for attribute-based database access
                  control},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943528},
  doi          = {10.1145/1943513.1943528},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/JahidGHO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JinTJ11,
  author       = {Lei Jin and
                  Hassan Takabi and
                  James B. D. Joshi},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Towards active detection of identity clone attacks on online social
                  networks},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943520},
  doi          = {10.1145/1943513.1943520},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/JinTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KirkpatrickK11,
  author       = {Michael S. Kirkpatrick and
                  Sam Kerr},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Enforcing physically restricted access control for remote data},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {203--212},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943540},
  doi          = {10.1145/1943513.1943540},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/KirkpatrickK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KomlenovicTZ11,
  author       = {Marko Komlenovic and
                  Mahesh V. Tripunitara and
                  Toufik Zitouni},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {An empirical assessment of approaches to distributed enforcement in
                  role-based access control {(RBAC)}},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {121--132},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943530},
  doi          = {10.1145/1943513.1943530},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/KomlenovicTZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KostiainenREA11,
  author       = {Kari Kostiainen and
                  Elena Reshetova and
                  Jan{-}Erik Ekberg and
                  N. Asokan},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Old, new, borrowed, blue --: a perspective on the evolution of mobile
                  platform security architectures},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943517},
  doi          = {10.1145/1943513.1943517},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/KostiainenREA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KumariPPK11,
  author       = {Prachi Kumari and
                  Alexander Pretschner and
                  Jonas Peschla and
                  Jens{-}Michael Kuhn},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Distributed data usage control for web applications: a social network
                  implementation},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943526},
  doi          = {10.1145/1943513.1943526},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/KumariPPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LorenziV11,
  author       = {David Lorenzi and
                  Jaideep Vaidya},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Identifying a critical threat to privacy through automatic image classification},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943535},
  doi          = {10.1145/1943513.1943535},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/LorenziV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MalkinTY11,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Moti Yung},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Key dependent message security: recent results and applications},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943516},
  doi          = {10.1145/1943513.1943516},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MalkinTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MayerTWM11,
  author       = {Daniel A. Mayer and
                  Dominik Teubert and
                  Susanne Wetzel and
                  Ulrike Meyer},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Implementation and performance evaluation of privacy-preserving fair
                  reconciliation protocols on ordered sets},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {109--120},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943529},
  doi          = {10.1145/1943513.1943529},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MayerTWM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MurugesanJNU11,
  author       = {Mummoorthy Murugesan and
                  Wei Jiang and
                  Ahmet Erhan Nergiz and
                  Serkan Uzunbaz},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {k-out-of-n oblivious transfer based on homomorphic encryption and
                  solvability of linear equations},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {169--178},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943536},
  doi          = {10.1145/1943513.1943536},
  timestamp    = {Tue, 29 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/MurugesanJNU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/QianX11,
  author       = {Haifeng Qian and
                  Shouhuai Xu},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Non-interactive editable signatures for assured data provenance},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {145--156},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943533},
  doi          = {10.1145/1943513.1943533},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/QianX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Sandhu11,
  author       = {Ravi S. Sandhu},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {The challenge of data and application security and privacy {(DASPY):}
                  are we up to it},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943515},
  doi          = {10.1145/1943513.1943515},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Sandhu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Thomsen11,
  author       = {Dan Thomsen},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Practical policy patterns},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {225--230},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943543},
  doi          = {10.1145/1943513.1943543},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Thomsen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Wang11,
  author       = {Xiaoyang Sean Wang},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Panel: research agenda for data and application security},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {283--284},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943551},
  doi          = {10.1145/1943513.1943551},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Wang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/XiKI11,
  author       = {Bowei Xi and
                  Murat Kantarcioglu and
                  Ali Inan},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Mixture of gaussian models and bayes error under differential privacy},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {179--190},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943537},
  doi          = {10.1145/1943513.1943537},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/XiKI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/YuZLL11,
  author       = {Junfeng Yu and
                  Shengzhi Zhang and
                  Peng Liu and
                  Zhitang Li},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {LeakProber: a framework for profiling sensitive data leakage paths},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943525},
  doi          = {10.1145/1943513.1943525},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/YuZLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhengX11,
  author       = {Qingji Zheng and
                  Shouhuai Xu},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Fair and dynamic proofs of retrievability},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {237--248},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943546},
  doi          = {10.1145/1943513.1943546},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhengX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2011,
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  publisher    = {{ACM}},
  year         = {2011},
  isbn         = {978-1-4503-0466-5},
  timestamp    = {Tue, 07 Jun 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}