|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3691 occurrences of 1860 keywords
|
|
|
Results
Found 8092 publication records. Showing 8092 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
101 | Jeffrey M. Voas, Linda Wilbanks |
Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 10(3), pp. 10-13, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
90 | Hae-ki Lee, Jae-sun Shim, Seung Lee, Jong-bu Kim |
A Relationship of Configuration Management Requirements between KISEC and ISO/IEC 15408. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 725-734, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Assurance requirement, KISEC, configuration management, common criteria |
88 | Brian D. Snow |
We Need Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 1, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
79 | Raymond A. Paul, Ann T. Tai |
Building High-Assurance Systems Using COTS Components: Whether, Why, When and How? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 17-19 November 1999, Washington, D.C, USA, Proceedings, pp. 115, 1999, IEEE Computer Society, 0-7695-0418-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
74 | Colette Reekie, Basie von Solms |
A Corporate Capital Protection and Assurance Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 546-553, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Corporate Capital Protection and Assurance, Information Security Governance, Digital Forensic Governance, Project Management Governance, IT Governance, Corporate Governance |
74 | Budhaditya Deb, Sudeept Bhatnagar, Badri Nath |
Information assurance in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wireless Sensor Networks and Applications ![In: Proceedings of the Second ACM International Conference on Wireless Sensor Networks and Applications, WSNA 2003, San Diego, CA, USA, September 19, 2003, pp. 160-168, 2003, ACM, 1-58113-764-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
sensor networks, reliability, information assurance, wireless broadcast |
73 | Nguyen Pham, Michel Riguidel |
Security Assurance Aggregation for IT Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France, pp. 72, 2007, IEEE Computer Society, 0-7695-2938-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security assurance, security assurance assessment, security assurance aggregation |
62 | Jon G. Hall, Lucia Rapanotti |
Assurance-Driven Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the Third International Conference on Software Engineering Advances, ICSEA 2008, October 26-31, 2008, Sliema, Malta, pp. 379-388, 2008, IEEE Computer Society, 978-0-7695-3372-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Dan Jong Kim 0001, Charles Steinfield, Ying-ju Lai |
Revisiting the role of web assurance seals in consumer trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 280-287, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
assurance seal service, awareness of assurance seal service, online privacy, online security, information quality |
60 | Yongdong Tan, Lijun Yin 0001, Qingquan Qian, Kinji Mori |
A Biologically Inspired Assurance Definition and Specification in Heterogeneous Autonomous Decentralized Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 23-25 October 2002, Tokyo, Japan, pp. 63-70, 2002, IEEE Computer Society, 0-7695-1769-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Colin O'Halloran |
Session II-A: Verification and Validation/High-Assurance Systems Acceptance-Based Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 26-29 November 2001, Coronado Island, San Diego, CA, USA, pp. 63-70, 2001, IEEE Computer Society, 0-7695-1426-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Verification, Formal Methods, CSP, Z, Acceptance, Safety critical, Simulink, Control Laws |
59 | Stefan Wagner 0001, Michael Meisinger |
Integrating a model of analytical quality assurance into the V-Modell XT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOQUA ![In: Third International Workshop on Software Quality Assurance, SOQUA 2006, Portland, Oregon, USA, November 6, 2006, pp. 38-45, 2006, ACM, 1-59593-584-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
V-Modell, quality costs, software quality economics, process model, quality assurance, quality model |
59 | Paul A. Karger, Helmut Kurth |
Increased Information Flow Needs for High-Assurance Composite Evaluations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 129-140, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
composite evaluation, smart cards, covert channels, common criteria, high assurance |
59 | Kazuo Kera, Keisuke Bekki, Kinji Mori, Issei Masumoto |
High Assurance Step-by-Step Autonomous Construction Technique for Large Real Time System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 23-25 October 2002, Tokyo, Japan, pp. 79-86, 2002, IEEE Computer Society, 0-7695-1769-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
System construction way, Autonomous decentralized system, High assurance system |
58 | Isabelle Comyn-Wattiau, Bernhard Thalheim |
Preface to QoIS 2009. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER Workshops ![In: Advances in Conceptual Modeling - Challenging Perspectives, ER 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009. Proceedings, pp. 200-201, 2009, Springer, 978-3-642-04946-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Patrick J. Graydon, John C. Knight, Elisabeth A. Strunk |
Achieving Dependable Systems by Synergistic Development of Architectures and Assurance Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WADS ![In: Architecting Dependable Systems IV [the book is a result of DSN 2006 workshops, Philadelphia, PA, USA], pp. 362-382, 2006, Springer, 978-3-540-74033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Giovanni Denaro, Mauro Pezzè, Onn Shehory |
SOQUA 2007: 4th international workshop on software quality assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007, pp. 615-616, 2007, ACM, 978-1-59593-811-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
processes and standards for software quality assurance, self-adaptive and self-healing approaches, formal methods, software testing, metrics, tools, automation |
55 | Yolanta Beres, Adrian Baldwin, Marco Casassa Mont, Simon Shiu |
On identity assurance in the presence of federated identity management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 27-35, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
models, control, risk, identity, audit, assurance |
54 | Jingyuan Li, Yafeng Wu, Krasimira Kapitanova, John A. Stankovic, Kamin Whitehouse, Sang Hyuk Son |
Run time assurance of application-level requirements in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SenSys ![In: Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, SenSys 2009, Berkeley, California, USA, November 4-6, 2009, pp. 367-368, 2009, ACM, 978-1-60558-519-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
application semantics, run time assurance, virtual event, wireless sensor networks, Petri net, software, assurance |
54 | Konstantin Beznosov, Philippe Kruchten |
Towards agile security assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada, pp. 47-54, 2004, ACM, 1-59593-076-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security assurance, security, agile methods, software development process, assurance, security engineering |
54 | Dan Thompson, M. Denz |
Incremental Assurance for Multilevel Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 81-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
incremental assurance approach, multilevel applications, high assurance database, economics, costs, security of data, data security, multilevel database |
53 | Shuichiro Yamanouchi |
High Assurance, My Personal Experience and View Point. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 23-25 October 2002, Tokyo, Japan, pp. 93-100, 2002, IEEE Computer Society, 0-7695-1769-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Fabio Massacci, Artsiom Yautsiukhin |
An algorithm for the appraisal of assurance indicators for complex business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 22-27, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
assurance indicator, quality of protection, security indicator, business process, hypergraphs, security metrics |
48 | Cynthia E. Irvine, Timothy E. Levin, Jeffery D. Wilson, David J. Shifflett, Barbara Pereira |
An Approach to Security Requirements Engineering for a High Assurance System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 7(4), pp. 192-206, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Security, Specification, Requirements, Engineering, Assurance, Threat |
48 | Douglas J. Landoll, Jeffrey R. Williams |
An enterprise assurance framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 5th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings, pp. 118-124, 1996, IEEE Computer Society, 0-8186-7445-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
enterprise assurance framework, enterprise security, evidence trade-offs, evidence standards, NIST internal report, security of data, confidence |
48 | Bhagyavati, Michael Olan, David Naugler, Charles Frank |
Information assurance in the undergraduate curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (1) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, USA, March 18-20, 2005, Volume 1, pp. 25-26, 2005, ACM, 1-59593-059-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
awareness of assurance, network security, information assurance, computer science curriculum, undergraduate curriculum |
47 | Albin Zuccato, Samuel Dubus, Evren Bulut |
Methodology for Service-Oriented Management of Security Assurance in Communication Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008, pp. 483-486, 2008, IEEE Computer Society, 978-0-7695-3482-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Bo-Chao Cheng, Huan Chen 0002, Ryh-Yuh Tseng |
A Theoretical Security Model for Access Control and Security Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 137-142, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | William E. Howden |
Good Enough versus High Assurance Software Testing and Evaluation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 13-14 November 1998, Washington, D.C, USA, Proceedings, pp. 166-177, 1998, IEEE Computer Society, 0-8186-9221-9. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
46 | Carlos Pérez Leguízamo, Aqeel A. Syed, Kinji Mori |
Assurance System Architecture for Distributed Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 23-25 October 2002, Tokyo, Japan, pp. 43-50, 2002, IEEE Computer Society, 0-7695-1769-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
loose consistency, mobile agent, distributed database, autonomy, assurance |
46 | Jeffrey M. Voas |
COTS and High Assurance: An Oxymoron? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 17-19 November 1999, Washington, D.C, USA, Proceedings, pp. 119-122, 1999, IEEE Computer Society, 0-7695-0418-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
dependability, COTS, high assurance |
46 | Wei-Tek Tsai, Weiguang Shao, Sanjai Rayadurgam, Jinbao Li, Raymond A. Paul |
Assurance-Based Y2K Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 17-19 November 1999, Washington, D.C, USA, Proceedings, pp. 27-36, 1999, IEEE Computer Society, 0-7695-0418-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Assurance-based testing, Y2K testing, software testing processes |
43 | Haixun Wang, Jian Yin 0002, Chang-Shing Perng, Philip S. Yu |
Dual encryption for query integrity assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, Napa Valley, California, USA, October 26-30, 2008, pp. 863-872, 2008, ACM, 978-1-59593-991-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
database outsourcing, security, integrity, encryption, audit |
43 | Patrick J. Graydon, John C. Knight, Elisabeth A. Strunk |
Assurance Based Development of Critical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 347-357, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Paul E. Black |
Software Assurance During Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 24-27 September 2006, Philadelphia, Pennsylvania, USA, pp. 70-72, 2006, IEEE Computer Society, 0-7695-2354-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Kazuo Kera, Keisuke Bekki, Naoki Miwa, Fumio Kitahara, Keiji Kamijyo, Kazuya Seki |
Assurance Technologies for Growing Systems and Their Application to Large-Scale Transport Operation Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: Fifth International Symposium on Autonomous Decentralized Systems, ISADS 2001, Dallas, Texas, USA, March 26-28, 2001, pp. 85-92, 2001, IEEE Computer Society, 0-7695-1065-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Raymond A. Paul, I-Ling Yen, Farokh B. Bastani, Jing Dong 0005, Wei-Tek Tsai, Krishna M. Kavi, Arif Ghafoor, Jaideep Srivastava |
An Ontology-Based Integrated Assessment Framework for High-Assurance Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSC ![In: Proceedings of the 2th IEEE International Conference on Semantic Computing (ICSC 2008), August 4-7, 2008, Santa Clara, California, USA, pp. 386-393, 2008, IEEE Computer Society, 978-0-7695-3279-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trustworthiness ontology, high assurance systems |
42 | Daniel Conte de Leon, Jim Alves-Foss |
Hidden Implementation Dependencies in High Assurance and Critical Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 32(10), pp. 790-811, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
software engineering documentation, work products, traceability, data dependencies, set theory, knowledge modeling, system development, Critical systems, high assurance systems, emergent properties, system safety, formal frameworks |
42 | Sanjay Goel, Damira Pon, Peter A. Bloniarz, Robert Bangert-Drowns, George Berg, Vince Delio, Laura Iwan, Thomas Hurbanek, Sandoor P. Schuman, Jagdish Gangolly, Adnan Baykal, Jon Hobbs |
Innovative model for information assurance curriculum: A teaching hospital. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Educ. Resour. Comput. ![In: ACM J. Educ. Resour. Comput. 6(3), pp. 2, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
teaching hospital, learning, Education, cases, constructivism, problem-based learning, information assurance, information security education, case-based learning |
42 | Bhagyavati |
Laboratory exercises in online information assurance courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Educ. Resour. Comput. ![In: ACM J. Educ. Resour. Comput. 6(4), pp. 4, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hands-on, blended courses, infrastructure safeguards, network security, online learning, information assurance |
42 | Huiming Yu, W. Liao, Xiaohong Yuan, Jinsheng Xu |
Teaching a web security course to practice information assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2006, Houston, Texas, USA, March 3-5, 2006, pp. 12-16, 2006, ACM, 1-59593-259-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
hybrid teaching approach, information assurance education, web security |
42 | Yingfei Dong, Zhi-Li Zhang |
Providing Controlled Quality Assurance for Streaming Stored-Videos Across the Internet Using VPNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 25(2), pp. 281-304, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multimedia content distribution, application-aware flow control, video streaming, quality assurance, proxy server |
42 | Deepak S. Yavagal, Seok Won Lee, Gail-Joon Ahn, Robin A. Gandhi |
Common criteria requirements modeling and its uses for quality of information assurance (QoIA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 130-135, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
information assurance metrics & measures, ontology, requirements modeling, common criteria |
42 | Kazuo Kera, Keisuke Bekki, Kinji Mori |
Step-by-Step System Construction Technique with Assurance Technology -Evaluation Measure for Step-by-Step System Construction-. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 101-110, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
System construction way, Autonomous decentralized system, High assurance system |
42 | Marvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox |
Ensuring Assurance in Mobile Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 114-118, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
mobile computing assurance, mobile code applications, malicious applets, rogue applets, JavaSoft, vendors, Java, research, data security, software portability, software portability |
42 | Yoshio Kataoka, Masayuki Hirayama, Jiro Okayasu, Tetsuji Fukaya |
An Approach to Reverse Quality Assurance with Data-Oriented Program Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 2nd Asia-Pacific Software Engineering Conference (APSEC '95), December 6-9, 1995, Brisbane, Queensland, Australia, pp. 324-332, 1995, IEEE Computer Society, 0-8186-7171-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Data-Oriented Program Analysis, Data Relation, Test, Reverse Engineering, Quality Assurance |
41 | Wasim A. Al-Hamdani |
Knowledge flow with information assurance track. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 52-57, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information assurance curriculum, information security curriculum, information security, curriculum development, information assurance |
40 | Masayuki Matsumoto |
Assurance Technology of System Test Based on Operators' Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008, pp. 5, 2008, IEEE Computer Society, 978-0-7695-3482-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | P. C. Donachy, Ronald H. Perrott, Terence J. Harmer, F. Sharkey |
Finance Sector: Requirements for High Assurance within Spatial SOA Based Grid Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USA, pp. 387-388, 2007, IEEE Computer Society, 0-7695-3043-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | T. Scott Ankrum, Alfred H. Kromholz |
Structured Assurance Cases: Three Common Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: Ninth IEEE International Symposium on High Assurance Systems Engineering (HASE 2005), 12-14 October 2005, Heidelberg, Germany, pp. 99-108, 2005, IEEE Computer Society, 0-7695-2377-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Elvis Papalilo, Bernd Freisleben |
Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 319-324, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Behaviour Trust, Statistical Methods of Quality Assurance, Quality of Service, Grid Computing, Trust Management, Trust Establishment |
39 | Jan Jürjens |
Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 25-26 March 2004, Tampa, FL, USA, pp. 231-240, 2004, IEEE Computer Society, 0-7695-2094-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security software engineering, formal methods in security, electronic purses, cryptographic protocols, security models, security engineering, security evaluation, high assurance systems, security verification |
39 | Masayuki Matsumoto, Tadao Tsurumaki, Satoru Kitamura, Dai Watanabe, Kinji Mori |
Assurance Evaluation Technology of Train Control System for Achieving Expansion during Operation . ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 23-25 October 2002, Tokyo, Japan, pp. 71-78, 2002, IEEE Computer Society, 0-7695-1769-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Train Control, D-ATC, Assurance, Autonomous Decentralized System |
39 | Stephen J. H. Yang, Sam Lin, Jonathan Lee, William C. Chu |
Specifying and Verifying Temporal Behavior of High Assurance Systems Using Reachability Tree Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 13-14 November 1998, Washington, D.C, USA, Proceedings, pp. 150-157, 1998, IEEE Computer Society, 0-8186-9221-9. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
verification, formal methods, Petri nets, specification, temporal logic, High assurance systems |
39 | Victor L. Winter, James M. Boyle |
Proving refinement transformations for deriving high-assurance software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 1st High-Assurance Systems Engineering Workshop (HASE '96), October 22, 1996, Niagara, Canada, Proceedings, pp. 68-77, 1996, IEEE Computer Society, 0-8186-7629-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
refinement transformation proving, high-assurance software engineering, refinement-based approach, TAMPR transformation system, automated refinement, semantic framework, automated reasoning system, software engineering, program transformations, program verification, stepwise refinement, high-level specification |
37 | Duane E. Sharp |
Enterprise Information Assurance: Key Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Bonnie A. Goins Pilewski |
Enterprise Information Assurance: Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Todd Fitzgerald |
Compliance Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Sean M. Price |
Neural Networks and Information Assurance Uses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Robert B. Batie Jr. |
DoD Information Assurance Certification and Accreditation Process (DIACAP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Andres Llana Jr. |
Application Service Providers: Information Assurance Considerations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Johann Schumann, Pramod Gupta, Yan Liu 0003 |
Application of Neural Networks in High Assurance Systems: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 1-19, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
37 | Samuel L. Braunstein, Hoi-Kwong Lo, Kenny Paterson, Peter Y. A. Ryan |
09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Classical and Quantum Information Assurance Foundations and Practice ![In: Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Martin R. Stytz, Michael May, Sheila B. Banks |
Recognition and categorization considerations for information assurance requirements development and speficication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440K, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Sheela V. Belur, Jonathan Gloster |
Development of a model for assessing the impact of information assurance functionality on secure messaging system performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700D, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Martin R. Stytz, Sheila B. Banks |
Personal privacy, information assurance, and the threat posed by malware techology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624107, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | William G. Perry |
How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624106, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Paul E. Black |
Static analysis summit II. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings of the 2007 Annual ACM SIGAda International Conference on Ada, Fairfax, Virginia, USA, November 4-8, 2007, pp. 101-107, 2007, ACM, 978-1-59593-876-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, evaluation, software engineering, design, reliability, ada, metrics, tool, safety, languages, assurance, high integrity, tool evaluation, software assurance |
37 | Lei Xia, Wei Huang, Hao Huang |
A Compositional Multiple Policies Operating System Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 291-302, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege |
37 | Elizabeth Fong, Vadim Okun |
Web Application Scanners: Definitions and Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 280, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
software security assurance tool, web application, vulnerability, software security, Software assurance |
37 | Michael E. Whitman, Herbert J. Mattord |
Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 49-51, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
curriculum instruction, information assurance curriculum, information security curriculum, information security, curriculum development, information assurance |
37 | Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz |
An Architecture for Multilevel Secure Interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 194-204, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
multilevel secure interoperability architecture, commercial sector, cost effective high assurance multilevel security, small communities, high assurance secure solution, MLS architecture, commercial single level hardware, specialized security devices, MLS CORBA, NRL Pump, Starlight Interactive Link, MLS cooperative computing, distributed computing, standards, distributed processing, heterogeneous environments, computer systems, COTS components, security levels |
36 | Chun-Hsiu Yeh, Tsui-Ping Chang, Wei-Cheng Shen |
Developing the Continuous Assurance Embedded Continuous Audit Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1049-1054, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Huiming Yu, Xiaohong Yuan, Jinsheng Xu, Stephen Providence, Bill Chu, Dechang Gu |
Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 1030-1035, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng |
Query Assurance Verification for Dynamic Outsourced XML Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 689-696, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Frank Elberzhager, Christian Denger |
A Comprehensive Planning Framework for Selecting and Customizing Quality Assurance Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO-SEAA ![In: 33rd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2007), August 28-31, 2007, Lübeck, Germany, pp. 297-306, 2007, IEEE Computer Society, 0-7695-2977-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Sung-Do Chi, Jong Sou Park, Jang-Se Lee |
A Role of DEVS Simulation for Information Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 27-41, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Rajendra P. Srivastava, Theodore J. Mock |
Evidential Reasoning for WebTrust Assurance Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Tuncer I. Ören |
Artificial Intelligence and Quality Assurance in Computer-Aided Systems Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCAST ![In: Computer Aided Systems Theory - EUROCAST'89, A Selection of Papers from the International Workshop EUROCAST'89, Las Palmas, Spain, February 26 - March 4, 1989, Proceedings, pp. 336-344, 1989, Springer, 3-540-52215-8. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
36 | Nitham Mohammed Hindi, Mohammad K. Najdawi, Hend Abdulrahman Mohamed Jolo |
An Examination of Assessment Practices in Colleges of Business at Various Middle East Countries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSKS (2) ![In: The Open Knowlege Society. A Computer Science and Information Systems Manifesto, First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings, pp. 354-359, 2008, Springer, 978-3-540-87782-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
assurance of learning, higher education assurance of learning, business assessment, benchmarking, Assessment, quality assurance |
35 | Manasi Vartak, Venkatesh Raghavan, Elke A. Rundensteiner |
QRelX: generating meaningful queries that provide cardinality assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pp. 1215-1218, 2010, ACM, 978-1-4503-0032-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
cardinality assurance, query refinement |
35 | John P. Dwyer, Steven J. Landry |
Separation Assurance and Collision Avoidance Concepts for the Next Generation Air Transportation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Human Interface and the Management of Information. Information and Interaction, Symposium on Human Interface 2009, Held as part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedings, Part II, pp. 748-757, 2009, Springer, 978-3-642-02558-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
separation assurance, roles and responsibilities, automation, Air traffic control |
35 | Robin A. Gandhi, Seok Won Lee |
Assurance Case Driven Case Study Design for Requirements Engineering Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
REFSQ ![In: Requirements Engineering: Foundation for Software Quality, 15th International Working Conference, REFSQ 2009, Amsterdam, The Netherlands, June 8-9, 2009, Proceedings, pp. 190-196, 2009, Springer, 978-3-642-02049-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Assurance Case, Requirements, Case study, Research methods |
35 | J. A. Drew Hamilton Jr., Robert Steven Owor, Khalil Dajani |
Building information assurance education partnerships with minority institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Richard Tapia Celebration of Diversity in Computing Conference ![In: Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, USA, April 1-4, 2009, pp. 58-63, 2009, ACM, 978-1-60558-217-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information assurance education, minority partnerships, national CAEIAE, security, human factors, management, diversity |
35 | Ziyao Xu, Yeping He, Lingli Deng |
An Integrity Assurance Mechanism for Run-Time Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 389-405, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Integrity Assurance, Virtual Trusted Platform Module, Trusted Computing, Virtual Machine Monitor |
35 | Olly Gotel, Christelle Scharff, Andrew Wildenberg |
Teaching software quality assurance by encouraging student contributions to an open source web-based system for the assessment of programming assignments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2008, Madrid, Spain, June 30 - July 2, 2008, pp. 214-218, 2008, ACM, 978-1-60558-078-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
automated assessment systems, webwork, java, requirements, programming, open source, unit testing, peer review, software quality assurance, junit |
35 | Tong Gao, Hachem Moussa, I-Ling Yen, Farokh B. Bastani, Jun-Jang Jeng |
Service Composition for Real-Time Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 1174-1179, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Real-Time assurance, Specification and analysis, Service Composition |
35 | Cemal Yilmaz 0001, Adam A. Porter, Arvind S. Krishna, Atif M. Memon, Douglas C. Schmidt, Aniruddha S. Gokhale, Balachandran Natarajan |
Reliable Effects Screening: A Distributed Continuous Quality Assurance Process for Monitoring Performance Degradation in Evolving Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 33(2), pp. 124-141, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
performance-o-ri-ented regression testing, design-of-experiments theory, Distributed continuous quality assurance |
35 | Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan |
PEI models towards scalable, usable and high-assurance information sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 145-150, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
PEI, slient-side access control, information sharing, trusted computing, high-assurance |
35 | Peirong Che, Zhaokun Bu, Rui Hou, Xinxing Shi |
Auditing Revenue Assurance Information Systems for Telecom Operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONFENIS (2) ![In: Research and Practical Issues of Enterprise Information Systems II, Volume 2, IFIP TC 8 WG 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007), October 14-16, 2007, Beijing, China, pp. 1597-1602, 2007, Springer, 978-0-387-76311-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Revenue assurance information system, Business process, Audit, Telecom operators |
35 | Bixin Li, Ying Zhou, Yancheng Wang, Junhui Mo |
Matrix-based component dependence representation and its applications in software quality assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 40(11), pp. 29-36, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
direct dependence graph, slicing techniques, dependence analysis, software quality assurance, dependence matrix |
35 | Stephen M. Moore, David S. Gierada, Kenneth W. Clark, G. James Blaine |
Image Quality Assurance in the Prostate, Lung, Colorectal, and Ovarian Cancer Screening Trial Network of the National Lung Screening Trial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 18(3), pp. 242-250, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
NLST, quality assurance, VPN, Clinical trial |
35 | Sarah M. North, Roy George, Khalil Shujaee, Alonza Mumford |
Collaborative information assurance capacity building at a consortium of colleges and universities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (1) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, USA, March 18-20, 2005, Volume 1, pp. 361-362, 2005, ACM, 1-59593-059-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
consortium, curriculum development, information assurance |
35 | Zhongwen Li |
Security and Safety Assurance Architecture: Model and Implementation (Supporting Multiple Levels of Criticality). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Distributed and Parallel Computing, 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005, Proceedings, pp. 363-369, 2005, Springer, 3-540-29235-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Safety Kernel, Security and Safety Assurance Architecture, Integrity Policy for Criticality, Distributed Control System |
35 | Melissa Jane Dark, Joseph J. Ekstrom, Barry M. Lunt |
Integration of information assurance and security into the IT2005 model curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005, Newark, NJ, USA, October 20-22, 2005, pp. 7-14, 2005, ACM, 1-59593-252-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
CC2005, IT2005, pervasive themes, education, IT, information technology, information assurance, IA, IAS |
35 | Ines Grützner, Stephan Weibelzahl, Patrick E. Waterson |
Improving courseware quality through life-cycle encompassing quality assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 946-951, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
courseware development, roles, quality assurance, software lifecycle |
35 | Daniel L. Moody, Guttorm Sindre |
Incorporating quality assurance processes into requirements analysis education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 8th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2003, Thessaloniki, Greece, June 30 - July 2, 2003, pp. 74-78, 2003, ACM, 1-58113-672-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
learning effectiveness, evaluation, software quality, conceptual modelling, quality assurance, IT education |
35 | Reiner R. Dumke, Heiko Grigoleit |
Efficiency of CAMEtools in software quality assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Qual. J. ![In: Softw. Qual. J. 6(2), pp. 157-169, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
metric tools, software metrics, software quality assurance |
35 | Nancy R. Mead, Joe Jarzombek |
Advancing Software Assurance with Public-Private Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 43(9), pp. 21-30, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
DHS Software Assurance Program, Education, Security and privacy, Standards and best practices, Software assurance |
35 | Patrick J. Graydon, John C. Knight |
Software Process Synthesis in Assurance Based Development of Dependable Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Eighth European Dependable Computing Conference, EDCC-8 2010, Valencia, Spain, 28-30 April 2010, pp. 75-84, 2010, IEEE Computer Society, 978-0-7695-4007-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
assurance arguments, software processes, safety-critical systems, software assurance, software dependability |
Displaying result #1 - #100 of 8092 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|