1![Thoughts on data policy solutions and data-centric career paths Terence Critchlow SSDBM 2011 Thoughts on data policy solutions and data-centric career paths Terence Critchlow SSDBM 2011](https://www.pdfsearch.io/img/0edc549caa6e092fc4b1afd35ff61f12.jpg) | Add to Reading ListSource URL: ssdbm2011.ssdbm.orgLanguage: English - Date: 2011-09-01 19:47:29
|
---|
2![Enterprise Strategy Group | Getting to the bigger truth.™ White Paper Meeting Data Governance Requirements Starts with Data Visibility Enterprise Strategy Group | Getting to the bigger truth.™ White Paper Meeting Data Governance Requirements Starts with Data Visibility](https://www.pdfsearch.io/img/4d16fb57dc5ec053d87a5e28fb16246f.jpg) | Add to Reading ListSource URL: www.egnyte.comLanguage: English - Date: 2016-06-07 21:04:42
|
---|
3![Institute for Cyber Security Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair](https://www.pdfsearch.io/img/c30a5eabdc606324205ae49dcb55c925.jpg) | Add to Reading ListSource URL: profsandhu.com- Date: 2013-10-09 17:57:42
|
---|
4![Securely explore your data BULLET-PROOF YOUR BIG APPS WITH DATA-CENTRIC SECURITY Securely explore your data BULLET-PROOF YOUR BIG APPS WITH DATA-CENTRIC SECURITY](https://www.pdfsearch.io/img/ae20f52f451cc69a2caedbc98c46c8ad.jpg) | Add to Reading ListSource URL: sqrrl.comLanguage: English - Date: 2014-10-07 15:52:42
|
---|
5![Interest-Based Access Control for Content-Centric Networks ∗ Cesar Ghali Marc A. Schlosberg Interest-Based Access Control for Content-Centric Networks ∗ Cesar Ghali Marc A. Schlosberg](https://www.pdfsearch.io/img/38a4dcde8ca31de9d5884fe35d4c597d.jpg) | Add to Reading ListSource URL: conferences2.sigcomm.orgLanguage: English - Date: 2015-10-01 13:18:45
|
---|
6![Towards a Data-centric View of Cloud Security Wenchao Zhou[ Micah Sherr\ William R. Marczak] Zhuoyao Zhang[ Tao Tao[ Boon Thau Loo[ Insup Lee[ [ Towards a Data-centric View of Cloud Security Wenchao Zhou[ Micah Sherr\ William R. Marczak] Zhuoyao Zhang[ Tao Tao[ Boon Thau Loo[ Insup Lee[ [](https://www.pdfsearch.io/img/03e35aeb670570289a91392eebf2fa46.jpg) | Add to Reading ListSource URL: security.cs.georgetown.eduLanguage: English - Date: 2010-10-31 23:40:39
|
---|
7![2013 IEEE Security and Privacy Workshops Preventive Inference Control in Data-centric Business Models Rafael Accorsi and G¨unter M¨uller University of Freiburg, Germany 2013 IEEE Security and Privacy Workshops Preventive Inference Control in Data-centric Business Models Rafael Accorsi and G¨unter M¨uller University of Freiburg, Germany](https://www.pdfsearch.io/img/6c9be7167c3a45905c2d048e1738e82b.jpg) | Add to Reading ListSource URL: ieee-security.orgLanguage: English - Date: 2013-05-05 16:04:46
|
---|
8![Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un](https://www.pdfsearch.io/img/f95dbfe283463ca83c8c9a2b4442c971.jpg) | Add to Reading ListSource URL: www.prianto.chLanguage: English - Date: 2013-03-08 10:05:06
|
---|
9![Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un](https://www.pdfsearch.io/img/2eed8c66f56f68c76ff9104b9f8f0845.jpg) | Add to Reading ListSource URL: www.prianto.atLanguage: English - Date: 2013-03-08 10:05:06
|
---|
10![Stefan Bumerl, Managing Director CRYPTAS Stefan is founder and managing director of CRYPTAS it-Security GmbH and is recognized as an innovator in the field of user-centric identities in highscaling market oriented system Stefan Bumerl, Managing Director CRYPTAS Stefan is founder and managing director of CRYPTAS it-Security GmbH and is recognized as an innovator in the field of user-centric identities in highscaling market oriented system](https://www.pdfsearch.io/img/082e0a7de205b7e6b0a7cc9d51622094.jpg) | Add to Reading ListSource URL: www.trustindigitallife.euLanguage: English - Date: 2015-03-19 08:38:45
|
---|