The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for downgrading with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1992-2002 (15) 2003-2005 (16) 2006-2009 (21) 2010-2019 (15) 2020-2023 (8)
Publication types (Num. hits)
article(24) inproceedings(51)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 71 occurrences of 46 keywords

Results
Found 75 publication records. Showing 75 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
105Peng Li, Steve Zdancewic Downgrading policies and relaxed noninterference. Search on Bibsonomy POPL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF downgrading policies, relaxed noninterference, information flow, language-based security, program equivalence
105Stephen Chong, Andrew C. Myers Security policies for downgrading. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF information flow, security policies, noninterference, declassification, downgrading
62Yi Lu 0003, John Potter, Jingling Xue Ownership Downgrading for Ownership Types. Search on Bibsonomy APLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
62Dong-Xi Liu CSchema: A Downgrading Policy Language for XML Access Control. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF XML, access control, programming language, type system, security policy
62Annalisa Bossi, Carla Piazza, Sabina Rossi Modelling Downgrading in Information Flow Security. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
60Silvia Crafa, Sabina Rossi P-congruences as non-interference for the pi-calculus. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF process calculi, noninterference, downgrading
53Liwu Chang, Ira S. Moskowitz Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. Search on Bibsonomy Workshop on New Security Paradigms The full citation details ... 1998 DBLP  DOI  BibTeX  RDF data mining, rules, inference, downgrading
52Sungeun Kim, Heechang Kim, John A. Copeland Dynamic radio resource allocation considering QoS in UMTS network. Search on Bibsonomy MWCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Angelo Brayner Lock Downgrading: An Approach to Increase Inter-transaction Parallelism in Advanced Database Applications. Search on Bibsonomy DEXA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
43Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg Expressive Declassification Policies and Modular Static Enforcement. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF verification, information flow, declassification, downgrading
43John A. Davidson Asymmetric Isolation. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF asymmetric isolation, unidirectional security, risk-free multi-level security, absolute security rule enforcement, security violations, multi-level communication handshaking, multiple single-level nodes, unidirectional links, hardware-enforced security, performance, cost, security of data, legacy systems, mandatory access control, downgrading
34Peng Li, Steve Zdancewic Practical Information-flow Control in Web-Based Information Systems. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Heiko Mantel, David Sands 0001 Controlled Declassification Based on Intransitive Noninterference. Search on Bibsonomy APLAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Hassene Aissi, Da Qi Chen, R. Ravi 0001 Vertex downgrading to minimize connectivity. Search on Bibsonomy Math. Program. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Zongyu Xie, Wenjie Xu, Hongxia Zhang, Li Li, Yongyu An, Guoqun Mao The value of MRI for downgrading of breast suspicious lesions detected on ultrasound. Search on Bibsonomy BMC Medical Imaging The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Elias Heftrig, Haya Schulmann, Michael Waidner Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
27Bernd Krieg-Brückner, Marc Robin Nolte, Mihai Pomarlan, Michaela Kümpel The Downgrading Axioms Challenge for Qualitative Composition of Food Ingredients (full paper). Search on Bibsonomy SemREC/SMART@ISWC The full citation details ... 2022 DBLP  BibTeX  RDF
27Muncheon Yoo, Hyundo Yoon, Changhee Hahn, Dongyoung Koo, Junbeom Hur Downgrading Backward Privacy of Searchable Encryption. Search on Bibsonomy ICOIN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Kylie Moore-Gilbert, Zainab Abdul-Nabi Authoritarian downgrading, (self)censorship and new media activism after the Arab Spring. Search on Bibsonomy New Media Soc. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Duo Liu, Xingni Li, Po-Chun Huang, Yi Gu, Yingjian Ling, Kan Zhong, Renping Liu, Xianzhang Chen, Liang Liang 0002 Downsizing Without Downgrading: Approximated Dynamic Time Warping on Nonvolatile Memories. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Hassene Aissi, Da Qi Chen, R. Ravi 0001 Vertex Downgrading to Minimize Connectivity. Search on Bibsonomy SWAT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Hassene Aissi, Da Qi Chen, R. Ravi 0001 Downgrading to Minimize Connectivity. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
27Oliver Wiese, Joscha Lausch, Jakob Bode, Volker Roth 0002 Beware the downgrading of secure electronic mail. Search on Bibsonomy STAST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Tianming Yang, Haitao Wu, Wei Sun GD-FTL: Improving the Performance and Lifetime of TLC SSD by Downgrading Worn-out Blocks. Search on Bibsonomy IPCCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Frank Plastria Up- and downgrading the euclidean 1-median problem and knapsack Voronoi diagrams. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Christine Fricker, Fabrice Guillemin, Philippe Robert Analysis of Downgrading for Resource Allocation. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Christine Fricker, Fabrice Guillemin, Philippe Robert, Guilherme Thompson Allocation Schemes of Ressources with Downgrading. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
27Lucas Waye, Pablo Buiras, Dan King, Stephen Chong, Alejandro Russo It's My Privilege: Controlling Downgrading in DC-Labels. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Kazunori Fujiwara Post-Delivery Message Downgrading for Internationalized Email Messages. Search on Bibsonomy RFC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Arnt Gulbrandsen Simplified POP and IMAP Downgrading for Internationalized Email. Search on Bibsonomy RFC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Ondrej Sváb-Zamazal, Anne Schlicht, Heiner Stuckenschmidt, Vojtech Svátek Constructs Replacing and Complexity Downgrading via a Generic OWL Ontology Transformation Framework. Search on Bibsonomy SOFSEM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Paavo Alku, Jouni Pohjalainen, Martti Vainio, Anne-Maria Laukkanen, Brad H. Story Improved formant frequency estimation from high-pitched vowels by downgrading the contribution of the glottal source with weighted linear prediction. Search on Bibsonomy INTERSPEECH The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Emilio Carrizosa, Belen Martin-Barragan Maximizing upgrading and downgrading margins for ordinal regression. Search on Bibsonomy Math. Methods Oper. Res. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Georgia Giannakopoulou, George M. Spyrou, Argyro Antaraki, Ioannis Andreadis, Dimitra Koulocheri, Flora Zagouri, Afroditi Nonni, George M. Filippakis, Konstantina S. Nikita, Panos A. Ligomenides, George C. Zografos Downgrading BIRADS 3 to BIRADS 2 category using a computer-aided microcalcification analysis and risk assessment system for early breast cancer. Search on Bibsonomy Comput. Biol. Medicine The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Grit Denker, Ashish Gehani, Minyoung Kim, David Hanz Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies. Search on Bibsonomy POLICY The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Elisabeth Gassner A game-theoretic approach for downgrading the 1-median in the plane with Manhattan metric. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Elisabeth Gassner Up- and downgrading the 1-center in a network. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Kazunori Fujiwara, Yoshiro Yoneya Downgrading Mechanism for Email Address Internationalization. Search on Bibsonomy RFC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Julien A. Thomas, Nora Cuppens-Boulahia, Frédéric Cuppens Modeling and Controlling Downgrading Operations in Information Systems. Search on Bibsonomy SITIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Ertunga C. Özelkan, Metin Çakanyildirim Resource downgrading. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Frédéric Cuppens, Alban Gabillon Modelling a Multilevel Database with Temporal Downgrading Functionalities. Search on Bibsonomy DBSec The full citation details ... 1995 DBLP  BibTeX  RDF
27Harald Tveit Alvestrand, James A. Romaguera, Kevin E. Jordan Rules for downgrading messages from X.400/88 to X.400/84 when MIME content-types are present in the messages. Search on Bibsonomy RFC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
27Stephen E. Hardcastle-Kille X.400 1988 to 1984 downgrading. Search on Bibsonomy RFC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
27Charles W. Kurak Jr., John McHugh A cautionary note on image downgrading. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
26Aslan Askarov, Andrei Sabelfeld Localized delimited release: combining the what and where dimensions of information release. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF de-classification, information flow, security policies, noninterference, downgrading
26Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers Secure program partitioning. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mutual distrust, distributed systems, integrity, type systems, security policies, Confidentiality, secrecy, declassification, downgrading
26Andrew C. Myers, Barbara Liskov Protecting privacy using the decentralized label model. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF principals, integrity, policies, lattice, confidentiality, roles, type checking, information flow controls, declassification, end-to-end, downgrading
17Amruta Mhatre, Durga Toshniwal Hiding co-occurring sensitive patterns in progressive databases. Search on Bibsonomy EDBT/ICDT Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF co-occurrence hiding, progressive databases, data mining, sequential pattern mining
17Cheng-Kok Koh, Weng-Fai Wong, Yiran Chen 0001, Hai Li 0001 Tolerating process variations in large, set-associative caches: The buddy cache. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF caches, Processor architectures, fault recovery, memory structures
17Tal A. Beery, Ram Zamir Multi Level Multiple Descriptions. Search on Bibsonomy DCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Saar Drimer, Markus G. Kuhn A Protocol for Secure Remote Updates of FPGA Configurations. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Satoshi Nakamura 0002, Takehiro Yamamoto, Katsumi Tanaka SyncRerank: Reranking Multi Search Results Based on Vertical and Horizontal Propagation of User Intention. Search on Bibsonomy WISE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17John C. Mitchell, Arnab Roy 0001, Paul D. Rowe, Andre Scedrov Analysis of EAP-GPSK Authentication Protocol. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Marti A. Hearst, Daniela Karin Rosner Tag Clouds: Data Analysis Tool or Social Signaller? Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Stephen Tse, Steve Zdancewic Run-time principals in information-flow type systems. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Decentralized label model, dynamic principals, run-time principals, security-typed language, type systems, information-flow, soundness, noninterference
17Arun Panayappan, Sriram Anand, Raghu P. Pushpakath Intelligent Agents as Trust Negotiators for Federated Security. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Christian Winter 0002, Thorsten Zerfaß, Matthias Elter, Stephan Rupp, Thomas Wittenberg Physically Motivated Enhancement of Color Images for Fiber Endoscopy. Search on Bibsonomy MICCAI (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Junghwa Chae Towards Modal Logic Formalization of Role-Based Access Control with Object Classes. Search on Bibsonomy FORTE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF object class hierarchy, tableaux method, Role-based access control, modal logic, object classes
17Li Jiang, Lingdi Ping, Xuezeng Pan Extending intransitive noninterference with probabilities in information flow security. Search on Bibsonomy IMSCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Padmavathi Mundur, Arun K. Sood, Robert Simon Class-based access control for distributed video-on-demand systems. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Stephen Tse, Steve Zdancewic A Design for a Security-Typed Language with Certificate-Based Declassification. Search on Bibsonomy ESOP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Byungchul Park, Eui-nam Huh, Hyunseung Choo, Yoojung Kim TCP Performance Enhancement Based on Virtual Receive Buffer with PID Control Mechanism. Search on Bibsonomy OTM Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ayça Azgin Hintoglu, Yücel Saygin Suppressing Microdata to Prevent Probabilistic Classification Based Inference. Search on Bibsonomy Secure Data Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Tachio Terauchi, Alexander Aiken Secure Information Flow as a Safety Problem. Search on Bibsonomy SAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Andrew D. Gordon 0001, Alan Jeffrey Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus. Search on Bibsonomy CONCUR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic Enforcing Robust Declassification. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Mudhakar Srivatsa, Bugra Gedik, Ling Liu 0001 Scaling Unstructured Peer-to-Peer Networks With Multi-Tier Capacity-Aware Overlay Topologies. Search on Bibsonomy ICPADS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Stephen Tse, Steve Zdancewic Run-time Principals in Information-flow Type Systems. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Jeremy W. Bryans, Maciej Koutny, Peter Y. A. Ryan Modelling Dynamic Opacity Using Petri Nets with Silent Actions. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF non-deducibility, observable behaviour, silent actions, Petri nets, anonymity, opacity
17Michael Backes 0001, Birgit Pfitzmann Intransitive Non-Interference for Cryptographic Purpose. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Joseph Y. Halpern, Kevin R. O'Neill Secrecy in Multiagent Systems. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Steve Zdancewic, Andrew C. Myers Robust Declassification. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Heiko Mantel Information Flow Control and Applications - Bridging a Gap. Search on Bibsonomy FME The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Brian Dunkel, Qiang Zhu 0001, Wing Lau, Suyun Chen Multiple-granularity interleaving for piggyback query processing. Search on Bibsonomy CASCON The full citation details ... 1999 DBLP  BibTeX  RDF database statistics, multiple-granularity interleaving, query processing, query optimization, piggybacking
17Simon N. Foley, Li Gong, Xiaolei Qian A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #75 of 75 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license