|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2260 occurrences of 1247 keywords
|
|
|
Results
Found 3573 publication records. Showing 3573 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi |
Execution monitoring enforcement for limited-memory systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 38, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bounded history automata, enforcement mechanisms, locally-testable properties, security policies, execution monitoring, edit automata |
54 | Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier |
Enforcement monitoring wrt. the safety-progress classification of properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 593-600, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
runtime enforcement, safety-progress, monitor, synthesis, property |
54 | Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks |
Cross-tier, label-based security enforcement for web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, June 29 - July 2, 2009, pp. 269-282, 2009, ACM, 978-1-60558-551-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
database programming, security enforcement, compilers, web applications, type systems |
54 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan |
Concurrent Enforcement of Usage Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 111-118, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Policy, System Management, Usage Control, Enforcement |
54 | Marco Casassa Mont, Robert Thyne |
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 118-134, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy-aware access control, obligation management, privacy, identity management, policy enforcement |
54 | Marco Casassa Mont, Robert Thyne |
Privacy policy enforcement in enterprises with identity management solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 25, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, access control, identity management, policy enforcement |
54 | P. Greve, J. Hoffman, R. E. Smith |
Using Type Enforcement to Assure a Configurable Guard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 146-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
type enforcement, configurable guard, guard systems, administrator configurable guard, input channel, connected output channel, assured processes, assurance arguments, operational guards, pipeline, electronic mail, electronic mail, trusted components |
53 | Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang |
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 388, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitrakos |
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 615-622, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne |
Domain and Type Enforcement Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 122-132, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP |
48 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pp. 143-144, 2011, ACM, 978-1-4503-0688-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Joe Tullio, Elaine M. Huang, David Wheatley, Harry Zhang, Claudia V. S. Guerrero, Amruta Tamdoo |
Experience, adjustment, and engagement: the role of video in law enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 1505-1514, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ubiquitous computing, surveillance, qualitative studies, contextual inquiry, law enforcement, video technologies |
47 | Mahesh V. Tripunitara, Bogdan Carbunar |
Efficient access enforcement in distributed role-based access control (RBAC) deployments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 155-164, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, efficiency, bloom filter, enforcement |
47 | Wei-Tek Tsai, Xinyu Zhou, Xiao Wei 0001 |
A policy enforcement framework for verification and control of service collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. E Bus. Manag. ![In: Inf. Syst. E Bus. Manag. 6(1), pp. 83-107, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Service-Oriented Architecture, Runtime verification, Policy enforcement, Dynamic collaboration |
47 | Phu H. Phung, David Sands 0001 |
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 1076-1082, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security policy enforcement, vehicle software, middleware, Aspect-oriented programming, OSGi, reference monitors |
47 | Marc Rogers, K. Scarborough, K. Frakes, C. San Martin |
Survey of Law Enforcement Perceptions Regarding Digital Evidence. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 41-52, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
State and local law enforcement, prosecutors, judges, digital evidence |
46 | Fei Yan, Philip W. L. Fong |
Efficient IRM enforcement of history-based access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 35-46, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distributed optimization protocol, history-based access control policies, language-based security, security automata, inlined reference monitors |
46 | Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Karl Klose |
From Formal Access Control Policies to Runtime Enforcement Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESSoS ![In: Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings, pp. 16-31, 2009, Springer, 978-3-642-00198-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Kirk J. Nahra |
HIPAA Security Enforcement Is Here. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(6), pp. 70-72, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier |
Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 41-55, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Tamara Dahlgren |
Performance-Driven Interface Contract Enforcement for Scientific Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBSE ![In: Component-Based Software Engineering, 10th International Symposium, CBSE 2007, Medford, MA, USA, July 9-11, 2007, Proceedings, pp. 157-172, 2007, Springer, 978-3-540-73550-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Dickson K. W. Chiu, Shing-Chi Cheung, Sven Till |
A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 74, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Sandro Etalle, William H. Winsborough |
A posteriori compliance control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 11-20, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, trust management, policy enforcement |
40 | Jay Ligatti, Lujo Bauer, David Walker 0001 |
Run-Time Enforcement of Nonsafety Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(3), pp. 19:1-19:41, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
monitoring, safety, Security policies, liveness, policy enforcement, security automata |
40 | Wei-Tek Tsai, Xinxin Liu, Yinong Chen, Raymond A. Paul |
Simulation Verification and Validation by Dynamic Policy Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 38th Annual Simulation Symposium (ANSS-38 2005), 4-6 April 2005, San Diego, CA, USA, pp. 91-98, 2005, IEEE Computer Society, 0-7695-2322-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Automated Policy Specification and Enforcement, Simulation, Verification and Validation |
40 | Ning Jiang, Kien A. Hua, Mounir A. Tantaoui |
Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWCN ![In: Mobile and Wireless Communication Networks, IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004), October 25-27, 2004, Paris, France, pp. 227-238, 2004, Kluwer/Springer, 0-387-23148-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Collaboration enforcement, First-hand experience, Mobile Ad Hoc Network, Reputation |
40 | Kurt Maly, Ajay Gupta 0003, Bjorn Kvande, Irwin B. Levinstein, Ravi Mukkamala, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers |
A privilege management and enforcement system for distributed resource sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 5th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings, pp. 106-111, 1996, IEEE Computer Society, 0-8186-7445-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
privilege management, enforcement system, distributed resource sharing, information based world, controlled access, delegated resource management, end user access, World Wide Web based interfaces, DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, Internet, access control, operating system, authorization, X Windows, distributed environment, unauthorized access, data manipulation |
39 | Christoph Sturm, Ela Hunt, Marc H. Scholl |
Distributed Privilege Enforcement in PACS. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings, pp. 142-158, 2009, Springer, 978-3-642-03006-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Ruo Ando, Youki Kadobayashi, Yoichi Shinoda |
An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2222-2229, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan |
Deriving Enforcement Mechanisms from Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 161-172, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Jun Feng, Glenn S. Wasson, Marty Humphrey |
Resource usage policy expression and enforcement in grid computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 8th IEEE/ACM International Conference on Grid Computing (GRID 2007), September 19-21, 2007, Austin, Texas, USA, Proceedings, pp. 66-73, 2007, IEEE Computer Society, 1-4244-1560-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Andreas Maierhofer, Theodosis Dimitrakos, Leonid Titkov, David Brossard |
Extendable and Adaptive Message-Level Security Enforcement Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: 2006 International Conference on Networking and Services (ICNS 2006), 16-21 July 2006, Silicon Valley, California, USA, pp. 72, 2006, IEEE Computer Society, 0-7695-2622-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | David W. Chadwick, Stijn F. Lievens |
Enforcing "sticky" security policies throughout a distributed application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware Security ![In: Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, pp. 1-6, 2008, ACM, 978-1-60558-363-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
application independent PEP, obligation enforcement, privacy policy enforcement, PDP, sticky policies |
35 | Dries Vanoverberghe, Frank Piessens |
A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMOODS ![In: Formal Methods for Open Object-Based Distributed Systems, 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo, Norway, June 4-6, 2008, Proceedings, pp. 240-258, 2008, Springer, 978-3-540-68862-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security policy enforcement, inline reference monitor |
35 | Nikhil Swamy, Brian J. Corcoran, Michael Hicks 0001 |
Fable: A Language for Enforcing User-defined Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 369-383, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
verified enforcement, access control, information flow, provenance, Language-based security |
35 | Bob Breeden, Judie Mulholland |
Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 288-292, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ICAC, internet crimes against children, proactive investigation, training, forensics, law enforcement |
35 | Susan Landau 0001 |
Security, Wiretapping, and the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(6), pp. 26-33, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Communications Assistance for Law Enforcement Act (CALEA), security, VoIP, wiretapping |
35 | Jason Crampton |
Specifying and enforcing constraints in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 43-50, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
enforcement context, separation of duty constraint, role-based access control, authorization constraint |
35 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
A fine-grained access control system for XML documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(2), pp. 169-202, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
authorizations specification and enforcement, World Wide Web, Access control, XML documents |
34 | David F. Ferraiolo, Vijay Atluri |
A meta model for access control: why is it needed and is it even possible to achieve? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 153-154, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Lu Yan, Nasser Abouzakhar, Hannan Xiao |
Multimodal security enforcement framework for wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 921-925, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious, security, trust, intrusion detection, framework, cooperative, multimodal, wireless ad hoc networks, incentive, selfish, enforcement |
34 | Anas Abou El Kalam, Yves Deswarte |
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers, pp. 95-108, 2008, Springer, 978-3-642-03551-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security policies and models, access control enforcement, security of critical infrastructures, runtime model checking |
34 | Javier Vázquez-Salceda, Sergio Álvarez-Napagao |
Using SOA Provenance to Implement Norm Enforcement in e-Institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COIN@AAMAS&AAAI ![In: Coordination, Organizations, Institutions and Norms in Agent Systems IV, COIN 2008 International Workshops, COIN@AAMAS 2008, Estoril, Portugal, May 12, 2008. COIN@AAAI 2008, Chicago, USA, July 14, 2008. Revised Selected Papers, pp. 188-203, 2008, Springer, 978-3-642-00442-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
norm enforcement, web services, MAS, SOA, architecture, monitoring, provenance, electronic institutions, SOA Governance |
34 | Zhiming Zhang, Weirong Jiang, Yibo Xue |
A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Sixth International Conference on Networking (ICN 2007), 22-28 April 2007, Sainte-Luce, Martinique, France, pp. 28, 2007, IEEE Computer Society, 978-0-7695-2805-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cooperation enforcement, mesh network, trust model, PID |
34 | Jeongsoo Kim |
The impact of e-government on child support enforcement policy outcomes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 8th Annual International Conference on Digital Government Research, Bridging Disciplines & Domains, DG.O 2007, Philadelphia, Pennsylvania, USA, May 20-23, 2007, pp. 212-221, 2007, Digital Government Research Center, 1-59593-599-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
automated information system, child support enforcement, policy outcome measurement, e-government |
34 | Hsinchun Chen, Homa Atabakhsh, Alan Gang Wang, Siddharth Kaza, Chunju Tseng, Yuan Wang, Shailesh Joshi, Tim Petersen, Chuck Violette |
COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 7th Annual International Conference on Digital Government Research, DG.O 2006, San Diego, California, USA, May 21-24, 2006, pp. 49-50, 2006, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
border safety, identity matching, naïve bayes model, data mining, semi-supervised learning, mutual information, law enforcement, homeland security, intelligence and security informatics |
34 | Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu 0001, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette |
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 2005 National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, USA, May 15-18, 2005, pp. 112-113, 2005, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
identity matching, data mining, social network analysis, law enforcement, homeland security |
34 | Ramaswamy Chandramouli |
Enterprise access policy enforcement for applications through hybrid models and XSLT technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 490-499, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
domain type enforcement (DTE), policy rules, role-based access control (RBAC), XML schema, XSLT, provisioning |
34 | Eladio Domínguez, Jorge Lloret, María Antonia Zapata |
Integrity Constraint Enforcement by Means of Trigger Templates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADVIS ![In: Advances in Information Systems, Second International Conference, ADVIS 2002, Izmir, Turkey, October 23-25, 2002, Proceedings, pp. 54-64, 2002, Springer, 3-540-00009-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Integrity constraint enforcement, Trigger generation, Trigger template, Active database systems |
34 | Robert Grimm 0001, Brian N. Bershad |
Separating access control policy, enforcement, and functionality in extensible systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 19(1), pp. 36-70, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
access check, policy-neutral enforcement, protection domain transfer, Java, security policy, auditing, SPIN, extensible systems, protection domain |
34 | Peter Herrmann, Heiko Krumm |
Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia, pp. 2-8, 2001, IEEE Computer Society, 0-7695-1177-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
security policy enforcement, trust information service, Software components, trust management, wrappers |
32 | Ehab Al-Shaer, Adel El-Atawy, Taghrid Samak |
Automated pseudo-live testing of firewall configuration enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 27(3), pp. 302-314, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Puneet Gupta, Scott D. Stoller |
Verification of Security Policy Enforcement in Enterprise Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 202-213, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Zhengping Wu, Lifeng Wang |
An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 329-334, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Jianfeng Lu, Ruixuan Li 0001, Zhengding Lu, Jinwei Hu, Xiaopu Ma |
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 403-410, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
constraint, Separation-of-Duty, usage control |
32 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Dynamic Enforcement of Abstract Separation of Duty Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 250-267, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Nataliia Bielova, Fabio Massacci, Andrea Micheletti |
Towards Practical Enforcement Theories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 239-254, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Thomas Scheffler, Stefan Geiß, Bettina Schnor |
An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 157-171, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu |
Security Enforcement Model for Distributed Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), 11-13 June 2008, Taichung, Taiwan, pp. 10-18, 2008, IEEE Computer Society, 978-0-7695-3158-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter |
Policy enforcement and compliance proofs for Xen virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008, pp. 101-110, 2008, ACM, 978-1-59593-796-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machines, trusted computing, integrity management |
32 | Osmar Marchi dos Santos, Andy J. Wellings |
Cost enforcement in the real-time specification for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Real Time Syst. ![In: Real Time Syst. 37(2), pp. 139-179, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Fault-tolerance, Model checking, Real-time specification for Java, Java programming language |
32 | Lu'ay A. Wahsheh, Jim Alves-Foss |
Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the IEEE International Conference on Information Reuse and Integration, IRI 2007, 13-15 August 2007, Las Vegas, Nevada, USA, pp. 183-189, 2007, IEEE Systems, Man, and Cybernetics Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Saeed Parsa, Morteza Damanafshan |
Seamless Secure Development of Systems: From Modeling to Enforcement of Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan, pp. 799-806, 2007, IEEE Computer Society, 1-4244-1030-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Min Hong, Samuel W. J. Welch, John Trapp, Min-Hyung Choi |
Implicit Constraint Enforcement for Rigid Body Dynamic Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part I, pp. 490-497, 2006, Springer, 3-540-34379-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Chris Vanden Berghe, Matthias Schunter |
Privacy Injector - Automated Privacy Enforcement Through Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 99-117, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Adam Barth, John C. Mitchell |
Enterprise privacy promises and enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WITS ![In: Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005, pp. 58-66, 2005, ACM, 1-58113-980-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
policy summary, modal logic, privacy policy, P3P, EPAL |
32 | Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland |
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 141-150, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Andy J. Wellings, Gregory Bollella, Peter C. Dibble, David Holmes |
Cost Enforcement and Deadline Monitoring in the Real-Time Specification for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: 7th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2004), 12-14 May 2004, Vienna, Austria, pp. 78-85, 2004, IEEE Computer Society, 0-7695-2124-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Min Hong, Samuel W. J. Welch, Min-Hyung Choi |
Intuitive Control of Dynamic Simulation Using Improved Implicit Constraint Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaSim ![In: Systems Modeling and Simulation: Theory and Applications, Third Asian Simulation Conference, AsiaSim 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers, pp. 315-323, 2004, Springer, 3-540-24477-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Steffen Jurk, Mira Balaban |
Improving Integrity Constraint Enforcement by Extended Rules and Dependency Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 12th International Conference, DEXA 2001 Munich, Germany, September 3-5, 2001, Proceedings, pp. 501-516, 2001, Springer, 3-540-42527-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai |
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 225-239, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Swarup Reddi |
Integrity Constraint Enforcement in the Functional Database Language PFL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advances in Databases, 11th British National Conference on Databases, BNCOD 11, Keele, UK, July 7-9, 1993, Proceedings, pp. 238-257, 1993, Springer, 3-540-56921-9. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
30 | Ali Alzahrani, Helge Janicke, Sarshad Abubaker |
Decentralized XACML Overlay Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 1032-1037, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
collaborative policy enforcement, decentralised policy enforcement, PDPs coordination |
29 | Mihnea Andrei, Xun Cheng, Sudipto Chowdhuri, Curtis Johnson, Edwin Seputis |
Ordering, distinctness, aggregation, partitioning and DQP optimization in sybase ASE 15. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, June 29 - July 2, 2009, pp. 917-924, 2009, ACM, 978-1-60558-551-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
abstract plans, distinctness, eager aggregation, lazy aggregation, logical operators, logical properties, physical operators, property enforcement, optimization, search engine, aggregation, grouping, ordering, search space, operator model, physical properties |
29 | Constantin Serban, Shmuel S. Tyszberowicz |
Enforcing Interaction Properties in AOSD-Enabled Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28 - November 2, 2006, Papeete, Tahiti, French Polynesia, pp. 8, 2006, IEEE Computer Society, 0-7695-2703-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Law-Governed Architecture, Architecture, Aspects, AOSD, Enforcement |
29 | Victoria Ungureanu |
Using certified policies to regulate E-commerce transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 5(1), pp. 129-153, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Contract terms, Scalability, Enforcement |
29 | Jeroen van Bemmel, Maarten Wegdam, Ko Lagerberg |
3PAC: Enforcing Access Policies for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2005 IEEE International Conference on Web Services (ICWS 2005), 11-15 July 2005, Orlando, FL, USA, pp. 589-596, 2005, IEEE Computer Society, 0-7695-2409-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web Services security, policy enforcement, distributed access control |
29 | Habtamu Abie, Pål Spilling, Bent Foyn |
A distributed digital rights management model for secure information-distribution systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 3(2), pp. 113-128, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Self-protecting Objects, Privacy enforcement, Authentication, Authorization, Digital rights management |
29 | Moni Naor, Benny Pinkas |
Efficient Trace and Revoke Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 1-20, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation |
27 | Alexander Pretschner, Fabio Massacci, Manuel Hilty |
Usage Control in Service-Oriented Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 83-93, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang |
Secure information sharing enabled by Trusted Computing and PEI models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 2-12, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
PEI models, secure information sharing, access control, authorization, trusted computing, security framework |
27 | Hyun-Jeong Kim, Dong Hoon Lee 0001, Moti Yung |
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 482-496, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Konstantin Beznosov |
Object Security Attributes: Enabling Application-Specific Access Control in Middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM ![In: On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30 - November 1, 2002, Proceedings, pp. 693-710, 2002, Springer, 3-540-00106-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Aaron G. Cass, Leon J. Osterweil |
Design Guidance through the Controlled Application of Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSSD ![In: Proceedings of the 10th International Workshop on Software Specification and Design, Shelter Island, San Diego, California, USA, November 5-7, 2000, pp. 195-200, 2000, IEEE Computer Society, 0-7695-0884-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Deborah G. Johnson, Keith W. Miller 0001 |
Anonymity, pseudonymity, or inescapable identity on the net (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 37-38, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Internet |
27 | David J. Jankowski |
Computer-Aided Systems Engineering Methodology Support and Its Effect on the Output of Structured Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 2(1), pp. 11-38, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
computer-aided systems engineering, structured analysis, data flow diagram |
27 | Yair Frankel, Moti Yung |
On Characterization of Escrow Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 24th International Colloquium, ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings, pp. 705-715, 1997, Springer, 3-540-63165-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
27 | Sören Preibusch |
Information Flow Control for Static Enforcement of User-Defined Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 133-136, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
privacy policy enforcement, user-defined policies, JIF, privacy negotiations, electronic commerce, case-study, information flow control |
27 | Shashank Shanbhag, Tilman Wolf |
Enforcement of Data-Plane Policies in Next-Generation Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2010, IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010, pp. 137-140, 2010, IEEE Computer Society, 978-1-4244-8206-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data-plane policy enforcement, network services, automated planning, packet processing, next-generation Internet |
27 | Matús Harvan, Alexander Pretschner |
State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 373-380, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, operating systems, information flow, usage control, system calls, reference monitor, enforcement |
27 | Walter Chang, Brandon Streiff, Calvin Lin |
Efficient and extensible security enforcement using dynamic data flow analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 39-50, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security enforcement, static analysis, dynamic data flow analysis |
27 | David M. Eyers, Sriram Srinivasan 0002, Ken Moody, Jean Bacon |
Compile-Time Enforcement of Dynamic Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 119-126, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Kilim, Dynamic security constraints, compile-time security enforcement |
27 | Wei Zhou 0006, Christoph Meinel |
Function-Based Authorization Constraints Specification and Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 119-124, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Access control, authorization constraints, constraints specification, constraints enforcement |
27 | Adrián Perreau de Pinninck, Carles Sierra, W. Marco Schorlemmer |
Friends no more: norm enforcement in multiagent systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 92, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
norm enforcement, ostracism, trust |
27 | Mahmoud Youssef, Nabil R. Adam, Vijayalakshmi Atluri |
Semantically enhanced enforcement of mobile consumer's privacy preferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1172-1176, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mobile consumer, semantic enforcement, privacy, incentive |
27 | Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette |
Visualization in law enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, April 2-7, 2005, pp. 1268-1271, 2005, ACM, 1-59593-002-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
crime analysis, crime network, spatial and temporal visualization, social network analysis, law enforcement, association network |
27 | Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette |
Visualization in law enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 2005 National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, USA, May 15-18, 2005, pp. 229-230, 2005, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
crime analysis, crime network, spatial and temporal visualization, social network analysis, law enforcement, association network |
27 | Patrick C. K. Hung, Kamalakar Karlapalem |
A Paradigm for Security Enforcement in CapBasED-AMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoopIS ![In: Proceedings of the Second IFCIS International Conference on Cooperative Information Systems, Kiawah Island, South Carolina, USA, June 24-27, 1997, Sponsored by IFCIS, The Intn'l Foundation on Cooperative Information Systems, pp. 79-88, 1997, IEEE Computer Society, 0-8186-7946-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
security enforcement paradigm, CapBasED-AMS, capability-based event-driven activity management system, activity execution, problem-solving agent, multiple interdependent tasks, task execution, unauthorized modification, pilferage, illegal privacy violation, specification-time data, compile-time data, run-time data, system infrastructure, secure match-making, security constraints, task coordination model, security resource control, role-based resource security model, security policies, task scheduling, security of data, security threats, unauthorized access |
27 | Joshua D. Guttman |
Filtering Postures: Local Enforcement for Global Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 120-129, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
filtering postures, global policy local enforcement, global network access control, optimal service, network topology, security policy, routers, authorisation, packet filtering, prototype implementation |
27 | Christoph F. Eick, Paul Werstein |
Rule-Based Consistency Enforcement for Knowledge-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 5(1), pp. 52-64, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
rule-based consistency enforcement, exception handlers, consistency constraints, rule entities, activation pattern controlled rule, data integrity, knowledge-based systems, knowledge based systems, system performance, consistency checks, application programs, production rule, forward chaining, knowledge-base management system |
Displaying result #1 - #100 of 3573 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|