Author of the publication

Sharing-based Privacy and Availability of Cloud Data Warehouses.

, , and . EDA, volume B-9 of RNTI, page 17-32. Hermann, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Harbi, Nouria
add a person with the name Harbi, Nouria
 

Other publications of authors with the same name

Secret Sharing for Cloud Data Security., , and . CoRR, (2017)Intelligent multi agent system based solution for data protection in the cloud., , , and . AICCSA, page 1-7. IEEE Computer Society, (2016)Verification of Security Coherence in Data Warehouse Designs., , , , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 207-213. Springer, (2012)Sécurisation des entrepôts de données contre les inférences en utilisant les réseaux Bayésiens., , , and . EDA, volume B-6 of RNTI, page 35-47. Cépaduès, (2010)A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud., , and . CoRR, (2017)An efficient local region and clustering-based ensemble system for intrusion detection., , and . IDEAS, page 185-191. ACM, (2011)Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection, , and . CoRR, (2010)Les Systèmes Multi Agents au Service de la Sécurité des Données Entreposées dans le Cloud., , , and . EDA, volume B-14 of RNTI, page 133-146. Éditions RNTI, (2018)A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud., , and . IJDWM, 11 (2): 22-43 (2015)Modeling Conflict of Interest in the Design of Secure Data Warehouses., , , and . KEOD, page 445-448. SciTePress, (2010)