top
Info
Contattaci
English
Browse
Persona
Opera
Editori
Soggetto
Persona
Opera
Persona/Opera
Vai a Pubblicazioni
Persona/Ente/Famiglia
Espandi
Riduci
Questo autore in
Wikipedia
Wikipedia
Export / Download
PDF
Excel
Marc21 (binary)
Marc XML
Marc (text)
BIBFRAME 2.0 dataset
Bertino, Elisa
ID:
4172878
Opere
Altre forme del nome
Bertino, Elisa
Elisa Bertino
Bertino, Elisa
Bertino, Elisa, 1957-
CODASPY'16: Sixth ACM Conference on Data and Application Security and Privacy New Orleans Louisiana USA 2016
CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy Tempe AZ USA 2018
CODASPY'13: Third ACM Conference on Data and Application Security and Privacy San Antonio Texas USA 2013
SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies Indianapolis Indiana USA 2018
CCS'15: The 22nd ACM Conference on Computer and Communications Security Denver Colorado USA 2015
CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy San Antonio Texas USA 2014
SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies Indianapolis Indiana USA 2017
CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy Scottsdale Arizona USA 2017
...(altre forme)
Seleziona tutte
Deseleziona
Espandi
Riduci
A-C
Advances in Database Technology - EDBT 2004
{ advances in database technology edbt 2004 }
...
Collaborative Computing: Networking, Applications and Worksharing
{ collaborative computing networking applications and worksharing }
...
Computer Security - ESORICS 96
{ computer security esorics 96 }
...
D-E
Data protection from insider threats
{ data protection from insider threats }
...
Distributed and Parallel Database Object Management
{ distributed and parallel database object management }
...
F-J
Homomorphic Encryption and Applications
{ homomorphic encryption and applications }
...
Identity Management
{ identity management }
...
Indexing Techniques for Advanced Database Systems
{ indexing techniques for advanced database systems }
...
Intelligent database systems
{ intelligent database systems }
...
Journal on Data Semantics II
{ journal on data semantics ii }
...
K-O
Object-Oriented Methodologies and Systems
{ object oriented methodologies and systems }
...
Object-oriented database systems
{ object oriented database systems }
...
P-T
Private information retrieval
{ private information retrieval }
...
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control
{ proceedings of the 2016 acm international workshop on attribute based access control }
...
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
{ proceedings of the 22nd acm on symposium on access control models and technologies }
...
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
{ proceedings of the 23nd acm on symposium on access control models and technologies }
...
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control
{ proceedings of the 2nd acm workshop on attribute based access control }
...
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
{ proceedings of the 2nd sigspatial acm gis 2009 international workshop on security and privacy in gis and lbs }
...
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
{ proceedings of the 3rd acm sigspatial international workshop on security and privacy in gis and lbs }
...
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
{ proceedings of the 4th acm sigspatial international workshop on security and privacy in gis and lbs }
...
Proceedings of the 4th ACM conference on Data and application security and privacy
{ proceedings of the 4th acm conference on data and application security and privacy }
...
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats
{ proceedings of the 7th acm ccs international workshop on managing insider security threats }
...
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
{ proceedings of the sigspatial acm gis 2008 international workshop on security and privacy in gis and lbs }
...
Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy
{ proceedings of the sixth acm conference on data and application security and privacy }
...
Proceedings of the Third ACM Workshop on Attribute-Based Access Control
{ proceedings of the third acm workshop on attribute based access control }
...
Proceedings of the second ACM conference on Data and Application Security and Privacy
{ proceedings of the second acm conference on data and application security and privacy }
...
Proceedings of the third ACM conference on Data and application security and privacy
{ proceedings of the third acm conference on data and application security and privacy }
...
RFID security and privacy
{ rfid security and privacy }
...
Roles, Trust, and Reputation in Social Media Knowledge Markets
{ roles trust and reputation in social media knowledge markets }
...
Security for Web services and service-oriented architectures
{ security for web services and service oriented architectures }
...