|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
89 | Abdullah Uz Tansel |
Integrity Constraints in Temporal Relational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 460-464, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Existential Integrity, Temporal Integrity Constraints, Temporal Databases, Integrity Constraints, Temporal Relations, Referential Integrity |
85 | William A. Arbaugh, David J. Farber, Jonathan M. Smith |
A Secure and Reliable Bootstrap Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 65-71, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
computer bootstrapping, bootstrap architecture, lower-layer integrity, hardware validity, integrity chain, system integrity guarantees, AEGIS architecture, recovery process, integrity check failures, robust systems, security, reliability, active networks, initialization, transitions, Internet commerce |
72 | Hamidah Ibrahim |
A Strategy for Semantic Integrity Checking in Distributed Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 9th International Conference on Parallel and Distributed Systems, ICPADS 2002, Taiwan, ROC, December 17-20, 2002, pp. 139-144, 2002, IEEE Computer Society, 0-7695-1760-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
69 | Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir |
Ranking and selecting integrity tests in a distributed database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 185-192, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
integrity constraints checking, distributed database, integrity constraints, integrity tests |
68 | Trent Jaeger, Reiner Sailer, Umesh Shankar |
PRIMA: policy-reduced integrity measurement architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 19-28, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Clark-Wilson Lite integrity, information flow, remote attestation |
62 | Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick D. McDaniel |
Establishing and Sustaining System Integrity via Root of Trust Installation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 19-29, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | George M. Mohay, J. Zellers |
Kernel and Shell-Based Applications Integrity Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 34-43, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues |
60 | Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire |
Hop Integrity in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Eighth Annual International Conference on Network Protocols, ICNP 2000, 14-17 November, 2000, Osaka, Japan, pp. 3-11, 2000, IEEE Computer Society, 0-7695-0921-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
hop integrity, secret exchange protocol, weak integrity protocol, strong integrity protocol, stateless protocol, protocols, network security, Transmission Control Protocol, computer networks, computer networks, TCP/IP, transport protocols, Internet Protocol, network protocol, security of data, router, telecommunication network routing, telecommunication security, message transmission |
55 | Mehrdad Nourani, Amir Attarha |
Signal Integrity: Fault Modeling and Testing in High-Speed SoCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 18(4-5), pp. 539-554, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
integrity fault, integrity loss, transfer function matrix, built-in self-test, system-on-chip, test pattern generation, signal integrity, model order reduction, interconnect testing, skew detection, noise detection, high-speed interconnect |
54 | Jiangyan Guo, Elkin Vumar |
The Vertex-Neighbor-Integrity of Digraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 370-376, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Vertex-neighbor-integrity, directed vertex-neighbor-integrity, orientation |
54 | Y. C. Hong, Stanley Y. W. Su |
Associative Hardware and Software Techniques for Integrity Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 6(3), pp. 416-440, 1981. The full citation details ...](Pics/full.jpeg) |
1981 |
DBLP DOI BibTeX RDF |
assertion and trigger, associative techniques, cellular-logic devices, integrity control, database management, database integrity |
53 | Liuying Tang, Sihan Qing |
A Practical Alternative to Domain and Type Enforcement Integrity Formal Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 225-237, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security goal, integrity, information flow, formal model, Security label |
53 | Ji-Won Byun, Yonglak Sohn, Elisa Bertino |
Systematic control and management of data integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 101-110, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, integrity, validation, metadata management, policy languages |
53 | Gopalan Sivathanu, Charles P. Wright, Erez Zadok |
Ensuring data integrity in storage: techniques and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005, pp. 26-36, 2005, ACM, 1-59593-233-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
storage integrity, intrusion detection, file systems |
53 | Dina Q. Goldin, Srinath Srinivasa, Vijaya Srikanti |
Active Databases as Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: 8th International Database Engineering and Applications Symposium (IDEAS 2004), 7-9 July 2004, Coimbra, Portugal, pp. 123-130, 2004, IEEE Computer Society, 0-7695-2168-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Abdullah Uz Tansel |
Temporal Data Modeling and Integrity Constraints in Relational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2004, 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings, pp. 459-469, 2004, Springer, 3-540-23526-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | James F. Peters, Sheela Ramanna, Elizabeth A. Unger |
Logic of Knowledge and Belief in the Design of an Integrity Kernel for an Office Information System (Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, CSC '90, Sheraton Washington Hotel, Washington, DC, USA, February 20-22, 1990, pp. 417, 1990, ACM, 0-89791-348-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
53 | Hendrik Decker |
Translating Advanced Integrity Checking Technology to SQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Database Integrity ![In: Database Integrity: Challenges and Solutions, pp. 203-249, 2002, Idea Group, 1-930708-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
53 | Laura C. Rivero, Jorge Horacio Doorn, Viviana E. Ferraggine |
Database Integrity: Fundamental and Current Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Database Integrity ![In: Database Integrity: Challenges and Solutions, pp. 17-65, 2002, Idea Group, 1-930708-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
53 | José Francisco Aldana Montes, Mariemma Inmaculada Yagüe del Valle, Antonio C. Gomez Lora |
Integrity Issues in the Web: Beyond Distributed Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Database Integrity ![In: Database Integrity: Challenges and Solutions, pp. 293-321, 2002, Idea Group, 1-930708-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
53 | Sergio Greco, Ester Zumpano |
Consistent Queries Over Databases with Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Database Integrity ![In: Database Integrity: Challenges and Solutions, pp. 172-202, 2002, Idea Group, 1-930708-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
53 | Karla A. V. Borges, Clodoveu A. Davis Jr., Alberto H. F. Laender |
Integrity Constraints in Spatial Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Database Integrity ![In: Database Integrity: Challenges and Solutions, pp. 144-171, 2002, Idea Group, 1-930708-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
53 | Juan M. Ale, Mauricio Minuto Espil |
Integrity Constraints in an Active Database Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Database Integrity ![In: Database Integrity: Challenges and Solutions, pp. 113-143, 2002, Idea Group, 1-930708-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
53 | Ulrich Schiel |
Integrity Maintenance in Extensible Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Database Integrity ![In: Database Integrity: Challenges and Solutions, pp. 322-334, 2002, Idea Group, 1-930708-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
50 | Amit Basu, Robert W. Blanning |
Discovering implicit integrity constraints in rule bases using metagraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (3) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 321-329, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
implicit integrity constraints, metagraphs, graph formalism, if-then rules, metagraph representation, knowledge representation, graph theory, data integrity, knowledge based systems, knowledge based system, decision support systems, DSS, problem solving, integrity constraints, domain knowledge, rule bases, rule base |
49 | Hendrik Decker, Davide Martinenghi |
Classifying integrity checking methods with regard to inconsistency tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 10th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 15-17, 2008, Valencia, Spain, pp. 195-204, 2008, ACM, 978-1-60558-117-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
inconsistency tolerance, integrity constraints, integrity checking |
49 | Sangchul Song, Joseph F. JáJá |
New techniques for ensuring the long term integrity of digital archives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 8th Annual International Conference on Digital Government Research, Bridging Disciplines & Domains, DG.O 2007, Philadelphia, Pennsylvania, USA, May 20-23, 2007, pp. 57-65, 2007, Digital Government Research Center, 1-59593-599-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
integrity audits, linked hashing, data integrity, digital archives |
49 | Seongkyun Shin, Yungseon Eo, William R. Eisenstadt, Jongin Shim |
Analytical signal integrity verification models for inductance-dominant multi-coupled VLSI interconnects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SLIP ![In: The Fourth IEEE/ACM International Workshop on System-Level Interconnect Prediction (SLIP 2002), April 6-7, 2002, San Diego, California, USA, Proceedings, pp. 61-68, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
TWA, signal integrity verification, delay, crosstalk, ringing, signal integrity, transmission line, glitch, VLSI interconnect, traveling-wave |
49 | Hao Yu 0001, Joanna Ho, Lei He 0001 |
Allocating power ground vias in 3D ICs for simultaneous power and thermal integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 14(3), pp. 41:1-41:31, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Thermal and power integrity, parametric 3D-IC design, macromodeling |
49 | Ian J. Hayes |
Dynamically Detecting Faults via Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Methods, Models and Tools for Fault Tolerance ![In: Methods, Models and Tools for Fault Tolerance, pp. 85-103, 2009, Springer, 978-3-642-00866-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
fault detection, Integrity constraint, action system, real-time programming |
49 | Huawei Zhao, Wenyu Zhang |
Definitions and Analysis of Integrity in Strand Spaces Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 153-158, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
strand spaces model, protocols, integrity |
49 | Ma. del Rocio Boone Rojas, Maya Carrillo Ruiz, María Beatríz Bernábe Loranca, Marco Antonio Soriano Ulloa |
Treatment of Integrity Restrictions in Relational DBMS with Triggers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONIELECOMP ![In: 16th International Conference on Electronics, Communications, and Computers (CONIELECOMP 2006), 27 February 2005 - 1 March 2006, Cholula, Puebla, Mexico, pp. 45, 2006, IEEE Computer Society, 0-7695-2505-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
integrity, relational model, triggers |
48 | Herman Balsters, Bert O. de Brock |
Integration of Integrity Constraints in Federated Schemata Based on Tight Constraining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoopIS/DOA/ODBASE (1) ![In: On the Move to Meaningful Internet Systems 2004: CoopIS, DOA, and ODBASE, OTM Confederated International Conferences, Agia Napa, Cyprus, October 25-29, 2004, Proceedings, Part I, pp. 748-767, 2004, Springer, 3-540-23663-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Niall McCarroll 0002, Jon M. Kerridge |
A Strategy for Semantic Integrity Enforcement in a Parallel Database Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Directions in Databases, 12th British National Conference on Databases, BNCOD 12, Guildford, United Kingdom, July 6-8, 1994, Proceedings, pp. 137-152, 1994, Springer, 3-540-58235-5. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
46 | Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark R. Heckman, William R. Shockley |
The SeaView Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(6), pp. 593-607, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
policy formalization, new data, SeaView security model, clearances, mandatory security, standard relational model, multilevel relations, discretionary security, application-independent properties, entity integrity, polyinstantiation integrity, classifications, software engineering, relational databases, security of data, users, labeling, data consistency, reference monitor, formal security model, referential integrity, derived data, multilevel database |
45 | Wei-Tek Tsai, Xiao Wei 0001, Yinong Chen, Raymond A. Paul, Jen-Yao Chung, Dawei Zhang |
Data provenance in SOA: security, reliability, and integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Serv. Oriented Comput. Appl. ![In: Serv. Oriented Comput. Appl. 1(4), pp. 223-247, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data reliability, Data provenance classification, Data integrity estimation model, Data integrity, Data security, Data collection, Data provenance |
45 | Mohammad H. Tehranipour, Nisar Ahmed, Mehrdad Nourani |
Testing SoC Interconnects for Signal Integrity Using Boundary Scan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 21st IEEE VLSI Test Symposium (VTS 2003), 27 April - 1 May 2003, Napa Valley, CA, USA, pp. 158-172, 2003, IEEE Computer Society, 0-7695-1924-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Integrity Loss Sensor, System-on-Chip Interconnects, Data Compression, Boundary Scan, Signal Integrity |
45 | Amir Attarha, Mehrdad Nourani |
Signal integrity fault analysis using reduced-order modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 39th Design Automation Conference, DAC 2002, New Orleans, LA, USA, June 10-14, 2002, pp. 367-370, 2002, ACM, 1-58113-461-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
integrity fault, locality factor, test pattern generation, signal integrity, reduced-order model |
45 | Dushan Z. Badal, Gerald J. Popek |
Cost and Performance Analysis of Semantic Integrity Validation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1979 ACM SIGMOD International Conference on Management of Data, Boston, Massachusetts, USA, May 30 - June 1., pp. 109-115, 1979, ACM, 0-89791-001-X. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
integrity assertions, performance analysis, database management, semantic integrity, cost analysis |
44 | Xiaolan Joy Zhang, Brian King |
An Anti-Counterfeiting RFID Privacy Protection Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(3), pp. 438-448, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, integrity, RFID security |
44 | Ziyao Xu, Yeping He, Lingli Deng |
An Integrity Assurance Mechanism for Run-Time Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 389-405, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Integrity Assurance, Virtual Trusted Platform Module, Trusted Computing, Virtual Machine Monitor |
44 | Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger |
Measuring integrity on mobile phone systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 155-164, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile phones, SELinux, integrity measurement |
44 | Kweku Kwakye Arthur, Martin S. Olivier, Hein S. Venter |
Applying The Biba Integrity Model to Evidence Management. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 317-327, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Evidence management, Biba integrity model, Casey’s certainty scale |
44 | Erik Yu-Shing Hu, Andy J. Wellings, Guillem Bernat |
XRTJ: An Extensible Distributed High-Integrity Real-Time Java Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: Real-Time and Embedded Computing Systems and Applications, 9th International Conference, RTCSA 2003, Tainan, Taiwan, February 18-20, 2003. Revised Papers, pp. 208-228, 2003, Springer, 3-540-21974-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Real-Time Java (RTJ), Distributed RTJ, Static Analysis Environment, Distributed Run-Time Environment, High-Integrity Systems |
44 | Can Türker, Michael Gertz 0001 |
Semantic integrity support in SQL: 1999 and commercial (object-)relational database management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 10(4), pp. 241-269, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Semantic integrity constraints, Object-relational databases, SQL:1999, Constraint enforcement |
44 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
An Analysis of Integrity Services in Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 175-187, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
representation of cryptologic goals, integrity, Confidentiality |
43 | Dolores Cuadra, Carlos Nieto, Paloma Martínez, Elena Castro, Manuel Velasco |
Preserving Relationship Cardinality Constraints in Relational Schemata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Database Integrity ![In: Database Integrity: Challenges and Solutions, pp. 66-112, 2002, Idea Group, 1-930708-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
43 | Jochen Rasch, Hans-Joachim Klein 0001 |
Functional Dependencies for Value Based Identification in Object-Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Database Integrity ![In: Database Integrity: Challenges and Solutions, pp. 250-292, 2002, Idea Group, 1-930708-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
43 | Jorge Horacio Doorn, Laura C. Rivero, Viviana E. Ferraggine |
Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Database Integrity ![In: Database Integrity: Challenges and Solutions, pp. 1-16, 2002, Idea Group, 1-930708-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
43 | Hendrik Decker, Davide Martinenghi |
Avenues to Flexible Data Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 4-8 September 2006, Krakow, Poland, pp. 425-429, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Michael Benedikt, Glenn Bruns |
On Guard: Producing Run-Time Checks from Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMAST ![In: Algebraic Methodology and Software Technology, 10th International Conference, AMAST 2004, Stirling, Scotland, UK, July 12-16, 2004, Proceedings, pp. 27-41, 2004, Springer, 3-540-22381-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Enric Mayol, Ernest Teniente |
Structuring the Process of Integrity Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 8th International Conference, DEXA '97, Toulouse, France, September 1-5, 1997, Proceedings, pp. 262-275, 1997, Springer, 3-540-63478-9. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
43 | Stefan Böttcher |
Improving the Concurrency of Integrity Checks and Write Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDT ![In: ICDT'90, Third International Conference on Database Theory, Paris, France, December 12-14, 1990, Proceedings, pp. 259-273, 1990, Springer, 3-540-53507-1. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
43 | Amihai Motro |
Integrity = Validity + Completeness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 14(4), pp. 480-502, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
41 | Hendrik Decker |
Basic Causes for the Inconsistency Tolerance of Query Answering and Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: Database and Expert Systems Applications, DEXA, International Workshops, Bilbao, Spain, August 30 - September 3, 2010, pp. 318-322, 2010, IEEE Computer Society, 978-0-7695-4174-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
inconsistency tolerance, answers that have integrity, integrity violation, integrity checking |
40 | Changwook Yoon, Junwoo Lee, Young-Jin Park, Hyunjeong Park, Jaemin Kim, Junso Pak, Joungho Kim |
Design of a Low-Noise UWB Transceiver SiP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Des. Test Comput. ![In: IEEE Des. Test Comput. 25(1), pp. 18-28, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
UWB, signal integrity, transceiver, SiP, low noise, power integrity |
40 | Khaue Rezende Rodrigues, Ronaldo dos Santos Mello |
A Faceted Taxonomy of Semantic Integrity Constraints for the XML Data Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 18th International Conference, DEXA 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 65-74, 2007, Springer, 978-3-540-74467-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
integrity constraint taxonomy, XML, data integrity |
40 | Einar Mykletun, Maithili Narasimha, Gene Tsudik |
Authentication and integrity in outsourced databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Storage ![In: ACM Trans. Storage 2(2), pp. 107-138, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Outsourced databases, signature aggregation, authentication, integrity, data integrity, storage, data authenticity |
40 | Mohammad H. Tehranipour, Mehrdad Nourani |
Signal Integrity Loss in SoC's Interconnects: A Diagnosis Approach Using Embedded Microprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: Proceedings IEEE International Test Conference 2002, Baltimore, MD, USA, October 7-10, 2002, pp. 1093-1102, 2002, IEEE Computer Society, 0-7803-7543-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Embedded Microprocessor, Integrity Loss, System-on-Chip, Diagnosis, Test Pattern Generation, Signal Integrity, Interconnect Testing, Noise Detection |
39 | Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy |
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 49-54, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
attestation systems, integrity monitoring, return-oriented programming |
39 | Zarina Dzolkhifli, Hamidah Ibrahim, Lilly Suriani Affendey |
Data caching strategies for checking integrity constraints of mobile database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria, pp. 186-192, 2008, ACM, 978-1-60558-349-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
checking integrity constraints, data caching, mobile databases |
39 | Peter A. Loscocco, Perry W. Wilson, J. Aaron Pendergrass, C. Durward McDonell |
Linux kernel integrity measurement using contextual inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 21-29, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
LKIM, attestation systems, system monitoring, integrity measurement |
39 | Jillian C. Wallis, Christine L. Borgman, Matthew S. Mayernik, Alberto Pepe, Nithya Ramanathan, Mark H. Hansen |
Know Thy Sensor: Trust, Data Quality, and Data Integrity in Scientific Digital Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECDL ![In: Research and Advanced Technology for Digital Libraries, 11th European Conference, ECDL 2007, Budapest, Hungary, September 16-21, 2007, Proceedings, pp. 380-391, 2007, Springer, 978-3-540-74850-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trust, user experience, data integrity, user centered design, data quality, scientific data |
39 | Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang |
Towards a VMM-based usage control framework for OS kernel integrity protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 71-80, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
kernel integrity, operating system protection, access control, authorization, security architecture, usage control, VMM, UCON |
39 | Chi-Hung Chi, Xiao-Yan Yu, Wenjie Zhang, Chen (Cherie) Ding, Weng-Fai Wong |
Data Integrity Framework and Language Support for Active Web Intermediaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCW ![In: Web Content Caching and Distribution: 9th International Workshop, WCW 2004, Beijing, China, October 18-20, 2004. Proceedings, pp. 94-105, 2004, Springer, 3-540-23516-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Web Intermediaries, Data Integrity, Content Adaptation, Content Delivery |
39 | Sergio Flesca, Sergio Greco, Ester Zumpano |
Active integrity constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 6th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 24-26 August 2004, Verona, Italy, pp. 98-107, 2004, ACM, 1-58113-819-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
logic programming, integrity constraints, inconsistent database |
39 | Jagun Kwon, Andy J. Wellings, Steve King 0001 |
Ravenscar-Java: a high integrity profile for real-time Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Java Grande ![In: Proceedings of the 2002 Joint ACM-ISCOPE Conference on Java Grande 2002, Seattle, Washington, USA, November 3-5, 2002, pp. 131-140, 2002, ACM, 1-58113-599-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
profile, real-time Java, high integrity systems |
39 | Alberto Belussi, Mauro Negri, Giuseppe Pelagatti |
An integrity constraints driven system for updating spatial databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM-GIS ![In: ACM-GIS 2000, Proceedings of the Eighth ACM Symposium on Advances in Geographic Information Systems, November 10-11, 2000, Washington D.C., USA, pp. 121-128, 2000, ACM, 1-58113-319-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
spatial integrity constraints, update, spatial data |
39 | Enric Mayol, Ernest Teniente |
Dealing with Modification Requests During View Updating and Integrity Constraint Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FoIKS ![In: Foundations of Information and Knowledge Systems, First International Symposium, FoIKS 2000, Burg, Germany, February 14-17, 2000, Proceedings, pp. 192-212, 2000, Springer, 3-540-67100-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
integrity constraint maintenance, view updating |
38 | Raymond Reiter |
What Should A Database Know? ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Seventh ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, March 21-23, 1988, Austin, Texas, USA, pp. 302-304, 1988, ACM, 0-89791-263-2. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
38 | Wenbo He, Xue Liu 0001, Hoang Nguyen, Klara Nahrstedt |
A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 22-26 June 2009, Montreal, Québec, Canada, pp. 14-19, 2009, IEEE Computer Society, 978-0-7695-3660-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Majd M. Al-Kofahi, Su Chang, Thomas E. Daniels |
SCWIM an Integrity Model for SOA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2008 IEEE International Conference on Web Services (ICWS 2008), September 23-26, 2008, Beijing, China, pp. 675-682, 2008, IEEE Computer Society, 978-0-7695-3310-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Hao Hu, Dengguo Feng |
BIFI: Architectural Support for Information Flow Integrity Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 605-609, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Stephan Mäs |
Reasoning on Spatial Semantic Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSIT ![In: Spatial Information Theory, 8th International Conference, COSIT 2007, Melbourne, Australia, September 19-23, 2007, Proceedings, pp. 285-302, 2007, Springer, 978-3-540-74786-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Johannes Osrael, Lorenz Froihofer, Matthias Gladt, Karl M. Göschka |
Adaptive Voting for Balancing Data Integrity with Availability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1510-1519, 2006, Springer, 3-540-48273-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Hai Zhuge, Yunpeng Xing |
Integrity Theory for Resource Space Model and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 6th International Conference, WAIM 2005, Hangzhou, China, October 11-13, 2005, Proceedings, pp. 8-24, 2005, Springer, 3-540-29227-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Michael T. Goodrich |
Leap-Frog Packet Linking and Diverse Key Distributions for Improved Integrity in Network Broadcasts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA, pp. 196-207, 2005, IEEE Computer Society, 0-7695-2339-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Nicholas J. Caine, Suzanne M. Embury |
LOIS: The "Lights Out" Integrity Subsystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advances in Databases, 18th British National Conference on Databases, BNCOD 18, Chilton, UK, July 9-11, 2001, Proceedings, pp. 57-74, 2001, Springer, 3-540-42265-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Ching-Shan Peng, Kwei-Jay Lin |
A semantic-based concurrency control protocol for real-time transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real Time Technology and Applications Symposium ![In: 2nd IEEE Real-Time Technology and Applications Symposium, RTAS '96, Boston, MA, USA, June 10-12, 1996, pp. 59-67, 1996, IEEE Computer Society, 0-8186-7448-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
semantic-based concurrency control protocol, logical data integrity, temporal data integrity, real-world events, sensor devices, consistent device readings, transaction serializability, transaction responsiveness, method compatibility matrix, consistency requirements, simulation, performance, real-time systems, predictability, data integrity, concurrency control, transaction processing, temporal databases, software performance evaluation, process control, access protocols, timeliness, real-time database systems, avionics, real-time transactions |
35 | Shi-Hao Chen, Ke-Cheng Chu, Jiing-Yuan Lin, Cheng-Hong Tsai |
DFM/DFY practices during physical designs for timing, signal integrity, and power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 12th Conference on Asia South Pacific Design Automation, ASP-DAC 2007, Yokohama, Japan, January 23-26, 2007, pp. 232-237, 2007, IEEE Computer Society, 1-4244-0629-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
0.13 micron, DFY, dynamic IR drop, process variation, physical designs, DFM, design for manufacturability, signal integrity, timing integrity, yield analysis, design for yield |
35 | Rohan Mandrekar, Krishna Bharath, Krishna Srinivasan, Ege Engin, Madhavan Swaminathan |
System level signal and power integrity analysis methodology for system-in-package applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 43rd Design Automation Conference, DAC 2006, San Francisco, CA, USA, July 24-28, 2006, pp. 1009-1012, 2006, ACM, 1-59593-381-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
modal decomposition, nodal admittance matrix method, system-in-package (SiP), causality, signal integrity, finite difference method, power integrity |
35 | Jan Chomicki |
Efficient Checking of Temporal Integrity Constraints Using Bounded History Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 20(2), pp. 149-186, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
temporal logic, temporal databases, integrity constraints, active databases, database integrity, triggers, real-time databases |
34 | Siddhartha Chhabra, Brian Rogers, Yan Solihin, Milos Prvulovic |
Making secure processors OS- and performance-friendly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Archit. Code Optim. ![In: ACM Trans. Archit. Code Optim. 5(4), pp. 16:1-16:35, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Secure processor architectures, memory encryption, memory integrity verification, virtualization |
34 | Wolfgang A. Halang, Alceu Heinke Frigeri |
Methods and Languages for Safety-Related Real-Time Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 17th International Conference, SAFECOMP'98, Heidelberg, Germany, October 5-7, 1998, Proceedings, pp. 196-208, 1998, Springer, 3-540-65110-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Safety controllers, Safe language subsets, Cause/effect tables, Function block diagrams, Safety integrity levels, Real time systems, Programming languages |
34 | Juan Du 0006, Wei Wei, Xiaohui Gu, Ting Yu 0001 |
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 293-304, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
secure dataflow processing, service integrity attestation, cloud computing |
34 | Takaji Fujiwara, Juan Manuel Estevez, Yoshinobu Satoh, Shigeru Yamada |
A calculation method for software safety integrity level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC-CARS ![In: 1st Workshop on Critical Automotive Applications: Robustness & Safety, CARS 2010 (EDCC Workshop), Valencia, Spain, 27 April 2010, pp. 31-34, 2010, ACM, 978-1-60558-915-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
calculation method, safety integrity level, software reliability and safety, software reliability growth model |
34 | Luiz Octavio Massato Kobayashi, Sérgio Shiguemi Furuie |
Proposal for DICOM Multiframe Medical Image Integrity and Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 22(1), pp. 71-83, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, image processing, authenticity, integrity, DICOM |
34 | Charles Riedesel, Eric D. Manley, Susan Poser, Jitender S. Deogun |
A model academic ethics and integrity policy for computer science departments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2009, Chattanooga, TN, USA, March 4-7, 2009, pp. 357-361, 2009, ACM, 978-1-60558-183-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
codes of conduct, integrity, policies, ethics |
34 | Santiago Urueña, Juan Zamorano, Juan Antonio de la Puente |
A Restricted Middleware Profile for High-Integrity Distributed Real-Time Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe 2009, 14th Ada-Europe International Conference, Brest, France, June 8-12, 2009. Proceedings, pp. 16-29, 2009, Springer, 978-3-642-01923-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distributed systems, real-time systems, Ada 2005, high-integrity systems, Ravenscar profile |
34 | Haixun Wang, Jian Yin 0002, Chang-Shing Perng, Philip S. Yu |
Dual encryption for query integrity assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, Napa Valley, California, USA, October 26-30, 2008, pp. 863-872, 2008, ACM, 978-1-59593-991-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
database outsourcing, security, integrity, encryption, audit |
34 | Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Improving Disk Sector Integrity Using K-Dimension Hashing. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 87-98, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Evidence integrity, k-dimension hashing, hard disks, hash values |
34 | Ke Zeng |
Publicly Verifiable Remote Data Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 419-434, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integrity, pairing, public verifiability, data outsourcing |
34 | Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia |
Efficient integrity checking of untrusted network storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008, pp. 43-54, 2008, ACM, 978-1-60558-299-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authenticated data structures, untrusted outsourced storage, security, data integrity |
34 | Sunghoon Chun, YongJoon Kim, Sungho Kang 0001 |
MDSI: Signal Integrity Interconnect Fault Modeling and Testing for SoCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 23(4), pp. 357-362, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RLC interconnect model, fault modeling, signal integrity, interconnect test |
34 | Stephen Farrell, Christian Damsgaard Jensen |
"End-by-Hop" Data Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 142-155, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
data-integrity service, data-fusion security, end-by-hop security |
34 | Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong, Lei Tang, Li Gao |
Integrity and its applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 350-354, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
integrity, NP-hard |
34 | Qingguang Ji, Sihan Qing, Yeping He |
A formal model for integrity protection based on DTE technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 49(5), pp. 545-565, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
integrity policy, information flow, formal model, type, domain |
34 | Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez |
A parallelized way to provide data encryption and integrity checking on a processor-memory bus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 43rd Design Automation Conference, DAC 2006, San Francisco, CA, USA, July 24-28, 2006, pp. 506-509, 2006, ACM, 1-59593-381-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bus encryption, data confidentiality and integrity, architectures |
34 | Sandro Etalle, William H. Winsborough |
Integrity constraints in trust management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 1-10, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, integrity, trust management, distributed system security |
34 | Andreas Meissner, Sharath Babu Musunoori, Lars C. Wolf |
MGMS/GML - Towards a New Policy Specification Framework for Multicast Group Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2004 Symposium on Applications and the Internet (SAINT 2004), 26-30 January 2004, Tokyo, Japan, pp. 233-242, 2004, IEEE Computer Society, 0-7695-2068-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Group Integrity, Multicast, Group Management, Policy Specification |
Displaying result #1 - #100 of 9246 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|