UCT CS Research Document Archive

Subject: E.3 DATA ENCRYPTION


    Number of records: 6.

  1. Kayem, Anne V.D.M., Selim G. Akl and Patrick Martin (2010) Adaptive Cryptographic Access Control, Jajodia, Sushil, Eds. . Springer.

  2. Kayem, Anne V.D.M., Patrick Martin and Selim G. Akl (2011) Efficient enforcement of dynamic cryptographic access control policies for outsourced data . In Proceedings 10th Information Security South Africa (ISSA), 2011 , pages 1-8, Johanesburg, South Africa.

  3. Kayem, Anne V.D.M., Patrick Martin and Selim G. Akl (2011) Enhancing Identity Trust in Cryptographic Key Management Systems for Dynamic Environments. Wiley's Security and Communication Networks Journal 4(1):74-94.

  4. Kayem, Anne V. D. M. (2010) On Monitoring Information Flow of Outsourced Data. In Proceedings 9th Conference on Information Security South Africa (ISSA 2010), Sandton, Johanesburg, South Africa.

  5. Kayem, Anne V.D.M. , Patrick Martin and Selim G. Akl (2011) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, in Yee, George, Eds. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global.

  6. Kayem, Anne V.D.M. , Patrick Martin and Selim G. Akl (2012) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, in Yee, George, Eds. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pages 95-128. IGI Global.

  7. This list was generated on Sat Jun 24 15:15:16 SAST 2017.