Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Monir Azraoui"'
Autor:
Eleonora Ciceri, Sauro Vicini, Monir Azraoui, Orhan Ermis, Marie Paindavoine, Sébastien Canard, Ramy Masalha, Muhammad Bahram, Melek Önen, Beyza Bozdemir, Bastien Vialla, Boris Rozenberg, Marco Mosconi
Publikováno v:
Privacy and Identity Management. Data for Better Living: AI and Privacy 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers
IFIP 2019, IFIP Summer School on Privacy and Identity Management
IFIP 2019, IFIP Summer School on Privacy and Identity Management, Aug 2019, Brugg Windisch, Switzerland. ⟨10.1007/978-3-030-42504-3_5⟩
Privacy and Identity Management. Data for Better Living: AI and Privacy ISBN: 9783030425036
Privacy and Identity Management
Privacy and Identity Management. Data for Better Living: AI and Privacy-14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers
IFIP 2019, IFIP Summer School on Privacy and Identity Management
IFIP 2019, IFIP Summer School on Privacy and Identity Management, Aug 2019, Brugg Windisch, Switzerland. ⟨10.1007/978-3-030-42504-3_5⟩
Privacy and Identity Management. Data for Better Living: AI and Privacy ISBN: 9783030425036
Privacy and Identity Management
Privacy and Identity Management. Data for Better Living: AI and Privacy-14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers
International audience; With the advent of big data technologies which bring better scalability and performance results, machine learning (ML) algorithms become affordable in several different applications and areas. The use of large volumes of data
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::235e6bcbab81513de35f1f9ce9a344aa
https://hal.archives-ouvertes.fr/hal-03151115/file/publi-6137_1.pdf
https://hal.archives-ouvertes.fr/hal-03151115/file/publi-6137_1.pdf
Publikováno v:
CLOSER
Scopus-Elsevier
Scopus-Elsevier
Publikováno v:
AsiaCCS
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security-ASIA CCS 16
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security-ASIA CCS '16
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security-ASIA CCS 16
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security-ASIA CCS '16
With the advent of cloud computing, individuals and companies alike are looking for opportunities to leverage cloud resources not only for storage but also for computation. Nevertheless, the reliance on the cloud to perform computation raises the una
Autor:
Anderson Santana de Oliveira, Monir Azraoui, Melek Önen, Karin Bernsmed, Walid Benghabrit, Hervé Grall, Jean-Claude Royer, Mohamed Sellami, Kaoutar Elkhiyaoui
Publikováno v:
Cloud Computing and Services Sciences
Cloud Computing and Services Sciences, Springer International Publishing Switzerland, 2015
Communications in Computer and Information Science ISBN: 9783319254135
CLOSER (Selected Papers)
Cloud Computing and Services Sciences, Springer International Publishing Switzerland, 2015
Communications in Computer and Information Science ISBN: 9783319254135
CLOSER (Selected Papers)
CLOSER 2014, Barcelona Spain, April 3-5, 2014, Revised Selected Papers; International audience; The widespread adoption of the cloud model for service delivery triggered several data protection issues.As a matter of fact, the proper delivery of these
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6895bfc232cf9c228e73703e94ed3afc
https://hal.science/hal-01214387
https://hal.science/hal-01214387
Autor:
Melek Önen, Monir Azraoui, Kaoutar Elkhiyaoui, Karin Bernsmed, Anderson Santana de Oliveira, Jakub Sendor
Publikováno v:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance ISBN: 9783319170152
DPM/SETOP/QASA
DPM/SETOP/QASA
Cloud Computing raises various security and privacy challenges due to the customers’ inherent lack of control over their outsourced data. One approach to encourage customers to take advantage of the cloud is the design of new accountability solutio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e42e4bf1c36684e4220f6438293020b7
https://doi.org/10.1007/978-3-319-17016-9_21
https://doi.org/10.1007/978-3-319-17016-9_21
Autor:
Kaoutar Elkhiyaoui, Monir Azraoui, Hervé Grall, Karin Bernsmed, Walid Benghabrit, Anderson Santana de Oliveira, Jean-Claude Royer, Melek Önen, Mohamed Sellami
Publikováno v:
CLOSER-4th International Conference on Cloud Computing and Services Science
CLOSER-4th International Conference on Cloud Computing and Services Science, Apr 2014, Barcelone, Spain
CLOSER
Scopus-Elsevier
CLOSER-4th International Conference on Cloud Computing and Services Science, Apr 2014, Barcelone, Spain
CLOSER
Scopus-Elsevier
International audience; Nowadays we are witnessing the democratization of cloud services. As a result, more and more end- users (individuals and businesses) are using these services for achieving their electronic transactions (shopping, administrativ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a69e57d48ab7eb4daf408696d45d6de9
https://inria.hal.science/hal-00941872
https://inria.hal.science/hal-00941872
Publikováno v:
Computer Security-ESORICS 2014 ISBN: 9783319112022
ESORICS (1)
ESORICS (1)
This paper presents StealthGuard, an efficient and provably secure proof of retrievabillity (POR) scheme. StealthGuard makes use of a privacy-preserving word search (WS) algorithm to search, as part of a POR query, for randomly-valued blocks called w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e20c5d3690e553c23eda3a8e6f4ffbbf
https://doi.org/10.1007/978-3-319-11203-9_14
https://doi.org/10.1007/978-3-319-11203-9_14
Publikováno v:
2015 IEEE Conference on Communications and Network Security (CNS)
CNS
CNS
Recent technological developments in cloud computing and the ensuing commercial appeal have encouraged companies and individuals to outsource their storage and computations to powerful cloud servers. However, the challenge when outsourcing data and c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3e76d5a7e1eabf5af22cd7783e072f1a