Data-centric security

Results: 37



#Item
1Thoughts on data policy solutions and data-centric career paths Terence Critchlow SSDBM 2011

Thoughts on data policy solutions and data-centric career paths Terence Critchlow SSDBM 2011

Add to Reading List

Source URL: ssdbm2011.ssdbm.org

Language: English - Date: 2011-09-01 19:47:29
2Enterprise Strategy Group | Getting to the bigger truth.™  White Paper Meeting Data Governance Requirements Starts with Data Visibility

Enterprise Strategy Group | Getting to the bigger truth.™ White Paper Meeting Data Governance Requirements Starts with Data Visibility

Add to Reading List

Source URL: www.egnyte.com

Language: English - Date: 2016-06-07 21:04:42
3Institute for Cyber Security  Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair

Institute for Cyber Security Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair

Add to Reading List

Source URL: profsandhu.com

- Date: 2013-10-09 17:57:42
    4Securely explore your data  BULLET-PROOF YOUR BIG APPS WITH DATA-CENTRIC SECURITY

    Securely explore your data BULLET-PROOF YOUR BIG APPS WITH DATA-CENTRIC SECURITY

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2014-10-07 15:52:42
    5Interest-Based Access Control for Content-Centric Networks ∗ Cesar Ghali  Marc A. Schlosberg

    Interest-Based Access Control for Content-Centric Networks ∗ Cesar Ghali Marc A. Schlosberg

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:45
    6Towards a Data-centric View of Cloud Security Wenchao Zhou[ Micah Sherr\ William R. Marczak] Zhuoyao Zhang[ Tao Tao[ Boon Thau Loo[ Insup Lee[ [

    Towards a Data-centric View of Cloud Security Wenchao Zhou[ Micah Sherr\ William R. Marczak] Zhuoyao Zhang[ Tao Tao[ Boon Thau Loo[ Insup Lee[ [

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2010-10-31 23:40:39
      72013 IEEE Security and Privacy Workshops  Preventive Inference Control in Data-centric Business Models Rafael Accorsi and G¨unter M¨uller University of Freiburg, Germany

      2013 IEEE Security and Privacy Workshops Preventive Inference Control in Data-centric Business Models Rafael Accorsi and G¨unter M¨uller University of Freiburg, Germany

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2013-05-05 16:04:46
        8Corporate Fact Sheet  Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un

        Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un

        Add to Reading List

        Source URL: www.prianto.ch

        Language: English - Date: 2013-03-08 10:05:06
          9Corporate Fact Sheet  Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un

          Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un

          Add to Reading List

          Source URL: www.prianto.at

          Language: English - Date: 2013-03-08 10:05:06
            10Stefan Bumerl, Managing Director CRYPTAS Stefan is founder and managing director of CRYPTAS it-Security GmbH and is recognized as an innovator in the field of user-centric identities in highscaling market oriented system

            Stefan Bumerl, Managing Director CRYPTAS Stefan is founder and managing director of CRYPTAS it-Security GmbH and is recognized as an innovator in the field of user-centric identities in highscaling market oriented system

            Add to Reading List

            Source URL: www.trustindigitallife.eu

            Language: English - Date: 2015-03-19 08:38:45