|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 26 occurrences of 22 keywords
|
|
|
Results
Found 25 publication records. Showing 25 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
113 | Boniface Hicks, Dave King 0002, Patrick D. McDaniel |
Jifclipse: development tools for security-typed languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007, pp. 1-10, 2007, ACM, 978-1-59593-711-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Jif, security-typed languages, Eclipse, developer tools |
51 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying and implementing privacy-preserving cryptographic protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(6), pp. 395-420, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Specification of Security Protocols, Dolev-Yao Intruder, Security-typed language, Typed MSR, Jif, Privacy, Linkability |
51 | Boniface Hicks, Dave King 0002, Patrick D. McDaniel, Michael Hicks 0001 |
Trusted declassification: : high-level policy for a security-typed language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 65-74, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
noninterference modolo trusted methods, FJifP, Jif, security-typed languages, trusted declassification, security policy, information-flow control, declassification |
41 | Vicente P. Guerrero-Bote, Felipe Zapico-Alonso, María Eugenia Espinosa-Calvo, Rocío Gómez Crisóstomo, Félix de Moya Anegón |
Import-export of knowledge between scientific subject categories: The iceberg hypothesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 71(3), pp. 423-441, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Boniface Hicks, Kiyan Ahmadizadeh, Patrick D. McDaniel |
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 153-164, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Jiandong Zhang, Yahui Liu, Zhesi Shen |
Covid-related Papers Contribute 50% on the JIF of High Impact Medicine Journals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Data Inf. Sci. ![In: J. Data Inf. Sci. 7(4), pp. 1-2, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Lina M. Jimenez, Martín Ochoa, Sandra Julieta Rueda |
Jif-Based Verification of Information Flow Policies for Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Softw. Eng. ![In: Int. J. Secur. Softw. Eng. 8(1), pp. 28-42, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Juan Miguel Campanario |
JIF-Plots: using plots of citations versus citable items as a tool to study journals and subject categories and discover new scientometric relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 113(2), pp. 1141-1154, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Liping Yu, Houqiang Yu |
Does the average JIF percentile make a difference? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 109(3), pp. 1979-1987, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
35 | Kyle Pullicino |
Jif: Language-based Information-flow Security in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1412.8639, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
35 | Kuzman Katkalov, Peter Fischer, Kurt Stenzel, Nina Moebius, Wolfgang Reif |
Evaluation of Jif and Joana as Information Flow Analyzers in a Model-Driven Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DPM/SETOP ![In: Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers, pp. 174-186, 2012, Springer, 978-3-642-35889-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
35 | Judit Bar-Ilan |
Rankings of information and library science journals by JIF and by h-type indices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Informetrics ![In: J. Informetrics 4(2), pp. 141-147, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Tove Faber Frandsen |
Journal self-citations - Analysing the JIF mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Informetrics ![In: J. Informetrics 1(1), pp. 47-58, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Sören Preibusch |
Information Flow Control for Static Enforcement of User-Defined Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 133-136, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
privacy policy enforcement, user-defined policies, JIF, privacy negotiations, electronic commerce, case-study, information flow control |
21 | Aslan Askarov, Andrei Sabelfeld |
Catch me if you can: permissive yet secure error handling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 45-57, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
exception handling, security type system |
21 | Stephen Chong, Andrew C. Myers |
End-to-End Enforcement of Erasure and Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 98-111, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Erasure, Expressive security policies, Information flow, Language-based security, Noninterference, Declassification |
21 | Ta-Chung Tsai, Alejandro Russo, John Hughes 0001 |
A Library for Secure Multi-threaded Information Flow in Haskell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 187-202, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Boniface Hicks, Tim Misiak, Patrick D. McDaniel |
Channels: Runtime System Infrastructure for Security-Typed Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 443-452, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Narongrit Sombatsompop, Apisit Kositchaiyong, Teerasak Markpin, Sekson Inrit |
Scientific evaluations of citation quality of international research articles in the SCI database: Thailand case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 66(3), pp. 521-535, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Tove Faber Frandsen |
Geographical concentration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 63(1), pp. 69-83, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Andrew D. Gordon 0001 |
From Typed Process Calculi to Source-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 12th International Symposium, SAS 2005, London, UK, September 7-9, 2005, Proceedings, pp. 2, 2005, Springer, 3-540-28584-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Aslan Askarov, Andrei Sabelfeld |
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 197-221, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Katia Hayati, Martín Abadi |
Language-Based Enforcement of Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, pp. 302-313, 2004, Springer, 3-540-26203-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Rogardt Heldal, Fredrik Hultin |
Bridging Model-Based and Language-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings, pp. 235-252, 2003, Springer, 3-540-20300-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Andrew C. Myers, Barbara Liskov |
Protecting privacy using the decentralized label model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 9(4), pp. 410-442, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
principals, integrity, policies, lattice, confidentiality, roles, type checking, information flow controls, declassification, end-to-end, downgrading |
Displaying result #1 - #25 of 25 (100 per page; Change: )
|
|