{"title":"Session details: Novel models and systems for access control","authors":"D. Thomsen","doi":"10.1145/3253030","DOIUrl":"https://doi.org/10.1145/3253030","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115213279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Secure provenance","authors":"R. Sandhu","doi":"10.1145/3253028","DOIUrl":"https://doi.org/10.1145/3253028","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121631281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Security and privacy techniques for social networks","authors":"Murat Kantarcioglu","doi":"10.1145/3253025","DOIUrl":"https://doi.org/10.1145/3253025","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Novel applications of privacy techniques","authors":"Keke Chen","doi":"10.1145/3253033","DOIUrl":"https://doi.org/10.1145/3253033","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Privacy threats and protection techniques","authors":"B. Carminati","doi":"10.1145/3253029","DOIUrl":"https://doi.org/10.1145/3253029","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126831169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Insider threats and data leakage","authors":"R. Krishnan","doi":"10.1145/3253026","DOIUrl":"https://doi.org/10.1145/3253026","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Secure data outsourcing","authors":"Gabriel Ghinita","doi":"10.1145/3253032","DOIUrl":"https://doi.org/10.1145/3253032","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114468261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Performance evaluation and enhancement","authors":"J. Joshi","doi":"10.1145/3253027","DOIUrl":"https://doi.org/10.1145/3253027","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126336654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Invited industry and application papers","authors":"E. Bertino","doi":"10.1145/3253031","DOIUrl":"https://doi.org/10.1145/3253031","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}