|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 10474 occurrences of 3799 keywords
|
|
|
Results
Found 18116 publication records. Showing 18116 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
135 | Derek L. Eager, Edward D. Lazowska, John Zahorjan |
A Comparison of Receiver-Initiated and Sender-Initiated Adaptive Load Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 1985 ACM SIGMETRICS conference on Measurement and modeling of computer systems, Austin, Texas, USA, August 26-29, 1985, pp. 1-3, 1985, ACM, 0-89791-169-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
82 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pp. 143-144, 2011, ACM, 978-1-4503-0688-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
77 | Phillip Krueger, Niranjan G. Shivaratri |
Adaptive Location Policies for Global Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 20(6), pp. 432-444, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
adaptive location policies, global scheduling algorithm, transfer policy, location policy, location policies, receiver-initiated, sender-initiated, symmetrically-initiated, system workload, search activities, short transfer latency, nonadaptive policies, system instability, scheduling, performance evaluation, distributed systems, load balancing, resource allocation, distributed processing, probability, load sharing, distributed scheduling, task migration, low overhead |
59 | James B. Cole, John Derrick, Zoran Milosevic, Kerry Raymond |
Author Obliged to Submit Paper before 4 July: Policies in an Enterprise Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings, pp. 1-17, 2001, Springer, 3-540-41610-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
ODP enterprise viewpoint, enterprise policies, formalising and refining policies, case study, delegation |
56 | I-Lung Kao, Randy Chow |
An Extended Capability Architecture To Enforce Dynamic Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 148-157, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers |
54 | Shuo Tang, Chris Grier, Onur Aciiçmez, Samuel T. King |
Alhambra: a system for creating, enforcing, and testing browser security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 941-950, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
web browser, web security, cross-site scripting |
50 | Scott J. Harmon, Scott A. DeLoach, Robby |
Trace-Based Specification of Law and Guidance Policies for Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAW ![In: Engineering Societies in the Agents World VIII, 8th International Workshop, ESAW 2007, Athens, Greece, October 22-24, 2007, Revised Selected Papers, pp. 333-349, 2007, Springer, 978-3-540-87653-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Danièle Beauquier, Dima Burago, Anatol Slissenko |
On the Complexity of Finite Memory Policies for Markov Decision Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFCS ![In: Mathematical Foundations of Computer Science 1995, 20th International Symposium, MFCS'95, Prague, Czech Republic, August 28 - September 1, 1995, Proceedings, pp. 191-200, 1995, Springer, 3-540-60246-1. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
50 | Emil Lupu, Morris Sloman |
Conflicts in Policy-Based Distributed Systems Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 25(6), pp. 852-869, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Obligation policy, meta-policy, management roles, conflict resolution, authorization policy, policy conflict |
47 | Alan R. Peslak |
Privacy policies of the largest privately held companies: a review and analysis of the forbes private 50. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPR ![In: Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel research 2005, Atlanta, Georgia, USA, April 14-16, 2005, pp. 104-111, 2005, ACM, 1-59593-011-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
fair information practices, private companies, privately held companies, privacy policies |
47 | Feng Wang 0017, Lixin Gao 0001 |
On inferring and characterizing internet routing policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, IMC 2003, Miami Beach, FL, USA, October 27-29, 2003, pp. 15-26, 2003, ACM, 1-58113-773-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
BGP, traffic engineering, routing policies |
44 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 298-307, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture |
44 | Yongbing Zhang, Katsuya Hakozaki, Hisao Kameda, Kentaro Shimizu |
A performance comparison of adaptive and static load balancing in heterogeneous distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 28st Annual Simulation Symposium (SS '95), April 25-28, 1995, Santa Barbara, California, USA, pp. 332-340, 1995, IEEE Computer Society, 0-8186-7091-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
heterogeneous distributed system model, processing capacities, job transfer, system state-information exchange, system loads, static policies, simulation, performance evaluation, resource allocation, virtual machines, delays, distributed processing, local area networks, local area networks, performance comparison, overheads, adaptive policies, heterogeneous distributed systems, adaptive load balancing, static load balancing |
44 | Eran Toch, Norman M. Sadeh, Jason I. Hong |
Generating default privacy policies for online social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010, pp. 4243-4248, 2010, ACM, 978-1-60558-930-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
default policies, location sharing technology, privacy, information sharing, online social networks |
44 | Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyerovich, Michael Carl Tschantz |
Verification and change-impact analysis of access-control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pp. 196-205, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
verification, XACML, decision diagram, change-impact analysis, access-control policies |
44 | Mohamed Ganna, Eric Horlait |
On Using Policies for Managing Service Provisioning in Agent-Based Heterogeneous Environments for Mobile Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 6-8 June 2005, Stockholm, Sweden, pp. 149-158, 2005, IEEE Computer Society, 0-7695-2265-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Vahid R. Karimi, Donald D. Cowan |
Verification of Access Control Policies for REA Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 422-427, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor |
A user study of the expandable grid applied to P3P privacy policy visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 45-54, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
expandable grid, privacy, user interface, policy, p3p |
41 | Fred B. Schneider |
Enforceable security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 3(1), pp. 30-50, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
EM security policies, SASI, security policies, proof carrying code, safety properties, security automata, inlined reference monitors |
41 | Patricia Balbastre, Ismael Ripoll, Alfons Crespo |
Control tasks delay reduction under static and dynamic scheduling policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: 7th International Workshop on Real-Time Computing and Applications Symposium (RTCSA 2000), 12-14 December 2000, Cheju Island, South Korea, pp. 522-, 2000, IEEE Computer Society, 0-7695-0930-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
control task delay reduction, dynamic scheduling policy, static scheduling policy, control action delays, dynamic scheduling policies, data acquisition interval, control action interval, DAI, control design phase, scheduling, delays, control systems, industrial application, data acquisition, data acquisition, scheduling policies, static scheduling, control algorithms, EDF scheduling, industrial control, CAI, worst case response time, task decomposition, control performances, digital control |
41 | Simon N. Foley |
Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 69-80, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
secure canonical upgrade policies, multilevel secure object stores, multilevel relabel policies, high-level subjects, low-level security labels, message filter model, object-oriented database, security of data |
41 | Piero A. Bonatti, Fabio Mogavero |
Comparing Rule-Based Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 11-18, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Rule-based policies, Policy comparison, Policy-aware service selection, Policy compliance, Datalog query containment, Policy verification |
40 | Jay Ligatti, Lujo Bauer, David Walker 0001 |
Run-Time Enforcement of Nonsafety Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(3), pp. 19:1-19:41, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
monitoring, safety, Security policies, liveness, policy enforcement, security automata |
40 | Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh |
Capturing Social Networking Privacy Preferences: Can Default Policies Help Alleviate Tradeoffs between Expressiveness and User Burden? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 1-18, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mining default policies, Privacy, User modeling |
40 | Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Hossein Pedram, Mehdi Dehghan 0001, Masoud Sabaei |
A New Method for Creating Efficient Security Policies in Virtual Private Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 663-678, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IPsec policies, security policy, security requirement, virtual private network |
40 | Lujo Bauer, Jay Ligatti, David Walker 0001 |
Composing security policies with polymer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, Chicago, IL, USA, June 12-15, 2005, pp. 305-314, 2005, ACM, 1-59593-056-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
composable security policies, run-time enforcement, security automata, program monitors, edit automata |
40 | Asit Dan, Philip S. Yu |
Performance Analysis of Buffer Coherency Policies in a Multisystem Data Sharing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 4(3), pp. 289-305, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
integrated analytic models, buffer coherency policies, multisystem data sharing environment, multisystem transaction processing environment, propagation oriented approaches, coherency messages, buffer hit probability, independent reference model, CPU overhead, performance evaluation, performance analysis, transaction processing, detection, shared memory systems, response time, simulation models, notification, maximum throughput |
40 | Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam |
Using Semantics for Policy-Based Web Service Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Parallel Databases ![In: Distributed Parallel Databases 18(1), pp. 37-64, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web services, workflow, composition, policies |
40 | Laura Bright, Avigdor Gal, Louiqa Raschid |
Adaptive pull-based policies for wide area data delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 31(2), pp. 631-671, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Pull-based, update models, caching, data delivery |
40 | Jian Ni, Danny H. K. Tsang, Sekhar Tatikonda, Brahim Bensaou |
Threshold and reservation based call admission control policies for multiservice resource-sharing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 773-783, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Ronald van der Lingen, André van der Hoek |
Dissecting Configuration Management Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCM ![In: Software Configuration Management, ICSE Workshops SCM 2001 and SCM 2003 Toronto, Canada, May 14-15, 2001 and Portland, OR, USA, May 9-10, 2003. Selected Papers, pp. 177-190, 2003, Springer, 3-540-14036-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Prasad Naldurg, Roy H. Campbell, M. Dennis Mickunas |
Developing Dynamic Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DANCE ![In: 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 29-31 May 2002, San Francisco, CA, USA, pp. 204-215, 2002, IEEE Computer Society, 0-7695-1564-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Xuhui Ao, Naftaly H. Minsky, Thu D. Nguyen |
A Hierarchical Policy Specification Language and Enforcement Mechanism for Governing Digital Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 38-49, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
39 | David F. Ferraiolo, Vijay Atluri |
A meta model for access control: why is it needed and is it even possible to achieve? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 153-154, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Brian P. Kettler, Gary Edwards, Mark Hoffman |
Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Jennifer Golbeck, Aaron Mannes, James A. Hendler |
Semantic Web Technologies for Terrorist Network Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | |
Legal Standards for Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Krishna R. Pattipati, Peter Willett 0001, Jefferey Allanach, Haiying Tu, Satnam Singh |
Hidden Markov Models and Bayesian Networks for Counter-Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Janusz Marecki, Nathan Schurr, Milind Tambe |
Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran |
Analysis of Heterogeneous Data in Ultrahigh Dimensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, Erik S. Connors |
Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Seth Greenblatt, Thayne Coffman, Sherry Marcus |
Behavioral Network Analysis for Terrorist Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna R. Pattipati, Stephen G. Eick, David Cousins, Michael Nicoletti |
Information Processing at Very High Speed Data Ingestion Rates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Kim A. Taipale |
Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Mark Lazaroff, David Snowden |
Anticipatory Models for Counter-Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Shuang Sun, Xiaocong Fan, John Yen |
Sharing Intelligence Using Information Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Douglas W. Oard |
Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Paul A. Kogut, Yui Leung, Kathleen Ryan, Linda Gohari, Mieczyslaw M. Kokar, Jerzy Letkowski |
Applying Semantic Web Reasoning to Counter-Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Jeff Jonas, John Karat |
Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Aaron B. Frank, Desmond Saunders-Newton |
Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt |
Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Clifford Behrens, Hyong Sop Shim, Devasis Bassu |
Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | David B. Skillicorn |
Social Network Analysis Via Matrix Decompositions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Nazli Choucri, Stuart E. Madnick, Michael D. Siegel |
Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Robert L. Popp, David Allen, Claudio Cioffi-Revilla |
Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
38 | Paul Rosenzweig |
Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
37 | Steffen Heinzl, Dominik Seiler, Ernst Juhnke, Bernd Freisleben |
Exposing validity periods of prices for resource consumption to web service users via temporal policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 235-242, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
temporal policies, web services, pricing, mashup, WS-Policies |
37 | Wolfgang A. Halang, Soon-Key Jung, Bernd J. Krämer |
Enforcing management policies in distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), August 28-30, 1995, Chenju, Korea, Proceedings, pp. 474-480, 1995, IEEE Computer Society, 0-8186-7125-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
management policies, formally definable management policies, platform independent management architecture, clerical management tasks, object-oriented class structure, rule execution, automated management tool invocation, automated policy management, object-oriented programming, resource allocation, open systems, processor scheduling, operating systems (computers), network operating systems, computer network management, production rules, open distributed systems, distributed systems management, middleware platforms |
37 | Randy Chow, I-Lung Kao |
Modeling complex access control policies in distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), August 28-30, 1995, Chenju, Korea, Proceedings, pp. 404-411, 1995, IEEE Computer Society, 0-8186-7125-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
access authorization, classified categories, state-dependent security, distributed systems, distributed processing, security policies, security of data, authorisation, access control model, access control policies, Boolean expressions |
37 | Dan Lin 0001, Prathima Rao, Elisa Bertino, Jorge Lobo 0001 |
An approach to evaluate policy similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 1-10, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
XACML policies, policy similarity measure, access control policies |
37 | David W. Chadwick, Stijn F. Lievens |
Enforcing "sticky" security policies throughout a distributed application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware Security ![In: Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, pp. 1-6, 2008, ACM, 978-1-60558-363-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
application independent PEP, obligation enforcement, privacy policy enforcement, PDP, sticky policies |
37 | Wolfgang Mühlbauer, Steve Uhlig, Bingjie Fu, Mickael Meulle, Olaf Maennel |
In search for an appropriate granularity to model routing policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan, August 27-31, 2007, pp. 145-156, 2007, ACM, 978-1-59593-713-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
BGP, inter-domain routing, routing policies |
37 | Massimo Marchi, Alessandra Mileo, Alessandro Provetti |
Specification and Execution of Declarative Policies for Grid Service Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOWS ![In: Web Services, European Conference, ECOWS 2004, Erfurt, Germany, September 27-30, 2004, Proceedings, pp. 102-115, 2004, Springer, 3-540-23202-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Declarative Policies, Customization, Grid Services, User preferences, Answer Set Programming |
37 | Kim Todd, Tabatha Verbick, Merlin Miller |
Policies for the digital age campus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 29th Annual ACM SIGUCCS Conference on User Services 2001, Portland, Oregon, USA, October 17-20, 2001, pp. 194-196, 2001, ACM, 1-58113-382-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
privacy, information technology, policies, computing, e-mail |
37 | Xiao-Yu Hu, Pablo Rodriguez 0001, Ernst W. Biersack |
Performance Study of Satellite-Linked Web Caches and Filtering Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2000, Broadband Communications, High Performance Networking, and Performance of Communication Networks, IFIP-TC6 / European Commission International Conference, Paris, France, May 14-19, 2000, Proceedings, pp. 580-595, 2000, Springer, 3-540-67506-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Satellite Distribution, Filtering Policies, World-Wide Web, Web Caching |
37 | Steven Davy, Brendan Jennings, John Strassner |
Using an Information Model and Associated Ontology for Selection of Policies for Conflict Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 82-85, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Policy Conflict Analysis, Policy Selection |
36 | Knot Pipatsrisawat, Adnan Darwiche |
Width-Based Restart Policies for Clause-Learning Satisfiability Solvers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAT ![In: Theory and Applications of Satisfiability Testing - SAT 2009, 12th International Conference, SAT 2009, Swansea, UK, June 30 - July 3, 2009. Proceedings, pp. 341-355, 2009, Springer, 978-3-642-02776-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor |
A Comparative Study of Online Privacy Policies and Formats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 37-55, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Arie Orlovsky, Danny Raz |
Decentralized enforcement of security policies for distributed computational systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 241-248, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, distributed system, policy enforcment |
36 | Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie 0001 |
Conformance Checking of Access Control Policies Specified in XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 2, pp. 275-280, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Giovanni Russello, Changyu Dong, Naranker Dulay |
Authorisation and Conflict Resolution for Hierarchical Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 201-210, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Adam Wierman |
On the effect of inexact size information in size based policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 34(3), pp. 21-23, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Chang-Woo Yang, Adam Wierman, Sanjay Shakkottai, Mor Harchol-Balter |
Tail asymptotics for policies favoring short jobs in a many-flows regime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS/Performance ![In: Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/Performance 2006, Saint Malo, France, June 26-30, 2006, pp. 97-108, 2006, ACM, 1-59593-319-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
many-sources, rate function, scheduling, large-deviations, SMART, SRPT, LAS |
36 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan, Kevin I. Jones |
A Compositional Event & Time-Based Policy Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 5-7 June 2006, London, Ontario, Canada, pp. 173-182, 2006, IEEE Computer Society, 0-7695-2598-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Wei Zhou 0006, Christoph Meinel, Vinesh H. Raja |
A Framework for Supporting Distributed Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 442-447, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis |
A Knowledge-Based Repository Model for Security Policies Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 112-121, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu |
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings, pp. 39-56, 2001, Springer, 3-540-41610-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Francesco Parisi-Presicce, Alexander L. Wolf |
Foundations for Software Configuration Management Policies Using Graph Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASE ![In: Fundamental Approaches to Software Engineering, Third Internationsl Conference, FASE 2000, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings, pp. 304-318, 2000, Springer, 3-540-67261-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
34 | P. R. Kumar 0001 |
Re-entrant lines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 13(1-3), pp. 87-110, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
thin film lines, re-entrant lines, buffer priority policies, due date policies, variance of delay, machine failures, set-up times, stability, queueing networks, scheduling policies, Manufacturing systems, semiconductor manufacturing, stochastic control, mean delay |
34 | Sruthi Bandhakavi, Charles C. Zhang, Marianne Winslett |
Super-sticky and declassifiable release policies for flexible information dissemination control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 51-58, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
release policies, privacy, declassification, sticky policies |
34 | Lisandro Zambenedetti Granville, Gustavo Augusto Faraco de Sá Coelho, Maria Janilce Bosquiroli Almeida, Liane Margarida Rockenbach Tarouco |
An architecture for automated replacement of QoS policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 796-801, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
policy definition, policy of policies, meta-policies, policy replacement automation, policy-based network management |
34 | Yusen Lin, Sourav Bhattacharya |
Impact of rollback recovery to program locality of reference and page replacement policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 29-31 October 1997, Tunis, Tunisia, Proceedings, pp. 104-111, 1997, IEEE Computer Society, 0-8186-8153-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
page replacement policies, cache block replacement policies, fault-triggered rollback, simulation, fault tolerance, performance, memory management, checkpointing, research, system recovery, rollback recovery, locality of reference, fault propagation |
34 | Ing-Ray Chen, Sayed Atef Banawan |
Modeling and Analysis of Concurrent Maintenance Policies for Data Structures Using Pointers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 19(9), pp. 902-911, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
concurrent maintenance policies, state reduction method, two-dimensional Markov model, one-dimensional Markov model, concurrent data structure maintenance policies, service time per operation, priority allocation functions, binary tree data structure, 1D Markov model, 2D Markov model, performance evaluation, performance analysis, data structures, software maintenance, Markov processes, tree data structures, pointers, closed form expression |
33 | Christer Magnusson, Louise Yngström |
Method for Insuring IT Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IT insurance method, IT insurance policies, estimated maximum IT loss, commercial and industrial security, risk management, security policies |
33 | Mor Armony, Nicholas Bambos |
Queueing Dynamics and Maximal Throughput Scheduling in Switched Processing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 44(3), pp. 209-252, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
switched processing systems, cone policies, adaptive batching policies, trace-based modeling, dynamic scheduling, throughput maximization |
33 | Fei Yan, Philip W. L. Fong |
Efficient IRM enforcement of history-based access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 35-46, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distributed optimization protocol, history-based access control policies, language-based security, security automata, inlined reference monitors |
33 | Laurent Vanbever, Bruno Quoitin, Olivier Bonaventure |
A hierarchical model for BGP routing policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRESTO ![In: Proceedings of the ACM SIGCOMM 2009 Workshop on Programmable Routers for Extensible Services of Tomorrow, PRESTO 2009, Barcelona, Spain, August 21, 2009, pp. 61-66, 2009, ACM, 978-1-60558-446-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network configuration, bgp, routing policies |
33 | John W. Stamey, Ryan A. Rossi |
Automatically identifying relations in privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 27th Annual International Conference on Design of Communication, SIGDOC 2009, Bloomington, Indiana, USA, October 5-7, 2009, pp. 233-238, 2009, ACM, 978-1-60558-559-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
latent relations, ambiguities, privacy policies |
33 | Brian S. Butler, Elisabeth Joyce, Jacqueline Pike |
Don't look now, but we've created a bureaucracy: the nature and roles of policies and rules in wikipedia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, 2008, Florence, Italy, April 5-10, 2008, pp. 1101-1110, 2008, ACM, 978-1-60558-011-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
collaboration, community, policies, policy, wikis, dynamics, wikipedia, rules |
33 | Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori |
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 100-117, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Fine-grained Security Policies, Workflow Monitoring, Business Processes |
33 | Johs Hansen Hammer, Gerardo Schneider |
On the Definition and Policies of Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 337-342, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
policies, confidentiality, norms |
33 | Kim-Phuong L. Vu, Vanessa Chambers, Fredrick P. Garcia, Beth Creekmur, John Sulaitis, Deborah Nelson, Russell Pierce, Robert W. Proctor |
How Users Read and Comprehend Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Human Interface and the Management of Information. Interacting in Information Environments, Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 802-811, 2007, Springer, 978-3-540-73353-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
usability, eye-tracking, privacy policies, reading comprehension |
33 | Evan Martin, Tao Xie 0001 |
A fault model and mutation testing of access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 667-676, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
test generation, fault model, mutation testing, access control policies |
33 | Ian Welch, Fan Lu |
Policy-driven reflective enforcement of security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1580-1584, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
reflection, security policies |
33 | Bradley Simmons, Hanan Lutfiyya |
Policies, grids and autonomic computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-5, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
optimisation, resource management, policies, autonomic computing |
33 | Michael Katchabaw, Hanan Lutfiyya, Michael A. Bauer 0001 |
Administrative Policies to Regulate Quality of Service Management in Distributed Multimedia Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMNS ![In: Management of Multimedia Networks and Services, 6th IFIP/IEEE International Conference, MMNS 2003, Belfast, Northern Ireland, UK, September 7-10, 2003, Proceedings, pp. 341-354, 2003, Springer, 3-540-20050-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Administrative policies, QoS management |
33 | Hilla Atzmon, Roy Friedman, Roman Vitenberg |
Replacement Policies for a Distributed Object Caching Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM ![In: On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30 - November 1, 2002, Proceedings, pp. 661-674, 2002, Springer, 3-540-00106-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
CORBA, Cache Replacement Policies, Object Caching |
33 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan |
Concurrent Enforcement of Usage Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 111-118, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Policy, System Management, Usage Control, Enforcement |
33 | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala |
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 134-147, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Stuart G. Stubblebine, Rebecca N. Wright |
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 28(3), pp. 256-285, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
authentication logic, recent-secure authentication, reasoning about time, authentication, formal methods, computer security, security policies, clock synchronization, revocation, security analysis, protocol analysis, distributed systems security |
Displaying result #1 - #100 of 18116 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|