{"title":"Session details: Novel techniques for data security","authors":"Adam J. Lee","doi":"10.1145/3255644","DOIUrl":"https://doi.org/10.1145/3255644","url":null,"abstract":"","PeriodicalId":174657,"journal":{"name":"Proceedings of the 4th ACM conference on Data and application security and privacy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133303387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Short papers 2","authors":"Gabriel Ghinita","doi":"10.1145/3255647","DOIUrl":"https://doi.org/10.1145/3255647","url":null,"abstract":"","PeriodicalId":174657,"journal":{"name":"Proceedings of the 4th ACM conference on Data and application security and privacy","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128587563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Novel techniques for application security","authors":"B. Carminati","doi":"10.1145/3255641","DOIUrl":"https://doi.org/10.1145/3255641","url":null,"abstract":"","PeriodicalId":174657,"journal":{"name":"Proceedings of the 4th ACM conference on Data and application security and privacy","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124062948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Short papers 1","authors":"Mohamed Shehab","doi":"10.1145/3255646","DOIUrl":"https://doi.org/10.1145/3255646","url":null,"abstract":"","PeriodicalId":174657,"journal":{"name":"Proceedings of the 4th ACM conference on Data and application security and privacy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129105508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Access control for applications","authors":"R. Krishnan","doi":"10.1145/3255638","DOIUrl":"https://doi.org/10.1145/3255638","url":null,"abstract":"","PeriodicalId":174657,"journal":{"name":"Proceedings of the 4th ACM conference on Data and application security and privacy","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116106357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Privacy preserving techniques","authors":"Murat Kantarcioglu","doi":"10.1145/3255648","DOIUrl":"https://doi.org/10.1145/3255648","url":null,"abstract":"","PeriodicalId":174657,"journal":{"name":"Proceedings of the 4th ACM conference on Data and application security and privacy","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126579819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Web security","authors":"A. Squicciarini","doi":"10.1145/3255639","DOIUrl":"https://doi.org/10.1145/3255639","url":null,"abstract":"","PeriodicalId":174657,"journal":{"name":"Proceedings of the 4th ACM conference on Data and application security and privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Mobile security","authors":"Debin Gao","doi":"10.1145/3255643","DOIUrl":"https://doi.org/10.1145/3255643","url":null,"abstract":"","PeriodicalId":174657,"journal":{"name":"Proceedings of the 4th ACM conference on Data and application security and privacy","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116063725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Keynote address 1","authors":"E. Bertino","doi":"10.1145/3255640","DOIUrl":"https://doi.org/10.1145/3255640","url":null,"abstract":"","PeriodicalId":174657,"journal":{"name":"Proceedings of the 4th ACM conference on Data and application security and privacy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116040406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}