The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for enforcement with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1966-1978 (16) 1979-1984 (19) 1986-1989 (16) 1990-1991 (17) 1992 (20) 1993 (16) 1994 (19) 1995 (25) 1996 (26) 1997 (36) 1998 (26) 1999 (42) 2000 (45) 2001 (65) 2002 (82) 2003 (131) 2004 (128) 2005 (195) 2006 (231) 2007 (257) 2008 (262) 2009 (204) 2010 (133) 2011 (96) 2012 (101) 2013 (129) 2014 (92) 2015 (102) 2016 (123) 2017 (124) 2018 (128) 2019 (119) 2020 (127) 2021 (127) 2022 (140) 2023 (129) 2024 (25)
Publication types (Num. hits)
article(1039) book(3) incollection(38) inproceedings(2430) phdthesis(61) proceedings(2)
Venues (Conferences, Journals, ...)
CoRR(138) SACMAT(60) POLICY(39) ISI(35) ACSAC(33) HICSS(29) DG.O(26) DBSec(24) ESORICS(24) SAC(24) CCS(21) ARES(20) Comput. Secur.(20) ACM Trans. Inf. Syst. Secur.(18) Comput. Law Secur. Rev.(18) IEEE Secur. Priv.(17) More (+10 of total 1451)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2260 occurrences of 1247 keywords

Results
Found 3573 publication records. Showing 3573 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
68Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi Execution monitoring enforcement for limited-memory systems. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bounded history automata, enforcement mechanisms, locally-testable properties, security policies, execution monitoring, edit automata
54Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier Enforcement monitoring wrt. the safety-progress classification of properties. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF runtime enforcement, safety-progress, monitor, synthesis, property
54Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks Cross-tier, label-based security enforcement for web applications. Search on Bibsonomy SIGMOD Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF database programming, security enforcement, compilers, web applications, type systems
54Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan Concurrent Enforcement of Usage Control Policies. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Policy, System Management, Usage Control, Enforcement
54Marco Casassa Mont, Robert Thyne A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy-aware access control, obligation management, privacy, identity management, policy enforcement
54Marco Casassa Mont, Robert Thyne Privacy policy enforcement in enterprises with identity management solutions. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, access control, identity management, policy enforcement
54P. Greve, J. Hoffman, R. E. Smith Using Type Enforcement to Assure a Configurable Guard. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforcement, configurable guard, guard systems, administrator configurable guard, input channel, connected output channel, assured processes, assurance arguments, operational guards, pipeline, electronic mail, electronic mail, trusted components
53Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
53Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitrakos Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne Domain and Type Enforcement Firewalls. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP
48Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Joe Tullio, Elaine M. Huang, David Wheatley, Harry Zhang, Claudia V. S. Guerrero, Amruta Tamdoo Experience, adjustment, and engagement: the role of video in law enforcement. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF ubiquitous computing, surveillance, qualitative studies, contextual inquiry, law enforcement, video technologies
47Mahesh V. Tripunitara, Bogdan Carbunar Efficient access enforcement in distributed role-based access control (RBAC) deployments. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, efficiency, bloom filter, enforcement
47Wei-Tek Tsai, Xinyu Zhou, Xiao Wei 0001 A policy enforcement framework for verification and control of service collaboration. Search on Bibsonomy Inf. Syst. E Bus. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Service-Oriented Architecture, Runtime verification, Policy enforcement, Dynamic collaboration
47Phu H. Phung, David Sands 0001 Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security policy enforcement, vehicle software, middleware, Aspect-oriented programming, OSGi, reference monitors
47Marc Rogers, K. Scarborough, K. Frakes, C. San Martin Survey of Law Enforcement Perceptions Regarding Digital Evidence. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF State and local law enforcement, prosecutors, judges, digital evidence
46Fei Yan, Philip W. L. Fong Efficient IRM enforcement of history-based access control policies. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributed optimization protocol, history-based access control policies, language-based security, security automata, inlined reference monitors
46Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Karl Klose From Formal Access Control Policies to Runtime Enforcement Aspects. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Kirk J. Nahra HIPAA Security Enforcement Is Here. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Tamara Dahlgren Performance-Driven Interface Contract Enforcement for Scientific Components. Search on Bibsonomy CBSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Dickson K. W. Chiu, Shing-Chi Cheung, Sven Till A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Sandro Etalle, William H. Winsborough A posteriori compliance control. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, trust management, policy enforcement
40Jay Ligatti, Lujo Bauer, David Walker 0001 Run-Time Enforcement of Nonsafety Policies. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF monitoring, safety, Security policies, liveness, policy enforcement, security automata
40Wei-Tek Tsai, Xinxin Liu, Yinong Chen, Raymond A. Paul Simulation Verification and Validation by Dynamic Policy Enforcement. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Automated Policy Specification and Enforcement, Simulation, Verification and Validation
40Ning Jiang, Kien A. Hua, Mounir A. Tantaoui Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience. Search on Bibsonomy MWCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Collaboration enforcement, First-hand experience, Mobile Ad Hoc Network, Reputation
40Kurt Maly, Ajay Gupta 0003, Bjorn Kvande, Irwin B. Levinstein, Ravi Mukkamala, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers A privilege management and enforcement system for distributed resource sharing. Search on Bibsonomy WETICE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF privilege management, enforcement system, distributed resource sharing, information based world, controlled access, delegated resource management, end user access, World Wide Web based interfaces, DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, Internet, access control, operating system, authorization, X Windows, distributed environment, unauthorized access, data manipulation
39Christoph Sturm, Ela Hunt, Marc H. Scholl Distributed Privilege Enforcement in PACS. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
39Ruo Ando, Youki Kadobayashi, Yoichi Shinoda An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan Deriving Enforcement Mechanisms from Policies. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Jun Feng, Glenn S. Wasson, Marty Humphrey Resource usage policy expression and enforcement in grid computing. Search on Bibsonomy GRID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Andreas Maierhofer, Theodosis Dimitrakos, Leonid Titkov, David Brossard Extendable and Adaptive Message-Level Security Enforcement Framework. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37David W. Chadwick, Stijn F. Lievens Enforcing "sticky" security policies throughout a distributed application. Search on Bibsonomy Middleware Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF application independent PEP, obligation enforcement, privacy policy enforcement, PDP, sticky policies
35Dries Vanoverberghe, Frank Piessens A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language. Search on Bibsonomy FMOODS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security policy enforcement, inline reference monitor
35Nikhil Swamy, Brian J. Corcoran, Michael Hicks 0001 Fable: A Language for Enforcing User-defined Security Policies. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF verified enforcement, access control, information flow, provenance, Language-based security
35Bob Breeden, Judie Mulholland Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ICAC, internet crimes against children, proactive investigation, training, forensics, law enforcement
35Susan Landau 0001 Security, Wiretapping, and the Internet. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Communications Assistance for Law Enforcement Act (CALEA), security, VoIP, wiretapping
35Jason Crampton Specifying and enforcing constraints in role-based access control. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF enforcement context, separation of duty constraint, role-based access control, authorization constraint
35Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati A fine-grained access control system for XML documents. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF authorizations specification and enforcement, World Wide Web, Access control, XML documents
34David F. Ferraiolo, Vijay Atluri A meta model for access control: why is it needed and is it even possible to achieve? Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Lu Yan, Nasser Abouzakhar, Hannan Xiao Multimodal security enforcement framework for wireless ad hoc networks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious, security, trust, intrusion detection, framework, cooperative, multimodal, wireless ad hoc networks, incentive, selfish, enforcement
34Anas Abou El Kalam, Yves Deswarte Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security policies and models, access control enforcement, security of critical infrastructures, runtime model checking
34Javier Vázquez-Salceda, Sergio Álvarez-Napagao Using SOA Provenance to Implement Norm Enforcement in e-Institutions. Search on Bibsonomy COIN@AAMAS&AAAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF norm enforcement, web services, MAS, SOA, architecture, monitoring, provenance, electronic institutions, SOA Governance
34Zhiming Zhang, Weirong Jiang, Yibo Xue A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cooperation enforcement, mesh network, trust model, PID
34Jeongsoo Kim The impact of e-government on child support enforcement policy outcomes. Search on Bibsonomy DG.O The full citation details ... 2007 DBLP  BibTeX  RDF automated information system, child support enforcement, policy outcome measurement, e-government
34Hsinchun Chen, Homa Atabakhsh, Alan Gang Wang, Siddharth Kaza, Chunju Tseng, Yuan Wang, Shailesh Joshi, Tim Petersen, Chuck Violette COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF border safety, identity matching, naïve bayes model, data mining, semi-supervised learning, mutual information, law enforcement, homeland security, intelligence and security informatics
34Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu 0001, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. Search on Bibsonomy DG.O The full citation details ... 2005 DBLP  BibTeX  RDF identity matching, data mining, social network analysis, law enforcement, homeland security
34Ramaswamy Chandramouli Enterprise access policy enforcement for applications through hybrid models and XSLT technologies. Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF domain type enforcement (DTE), policy rules, role-based access control (RBAC), XML schema, XSLT, provisioning
34Eladio Domínguez, Jorge Lloret, María Antonia Zapata Integrity Constraint Enforcement by Means of Trigger Templates. Search on Bibsonomy ADVIS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Integrity constraint enforcement, Trigger generation, Trigger template, Active database systems
34Robert Grimm 0001, Brian N. Bershad Separating access control policy, enforcement, and functionality in extensible systems. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF access check, policy-neutral enforcement, protection domain transfer, Java, security policy, auditing, SPIN, extensible systems, protection domain
34Peter Herrmann, Heiko Krumm Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security policy enforcement, trust information service, Software components, trust management, wrappers
32Ehab Al-Shaer, Adel El-Atawy, Taghrid Samak Automated pseudo-live testing of firewall configuration enforcement. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Puneet Gupta, Scott D. Stoller Verification of Security Policy Enforcement in Enterprise Systems. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Zhengping Wu, Lifeng Wang An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Jianfeng Lu, Ruixuan Li 0001, Zhengding Lu, Jinwei Hu, Xiaopu Ma Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF constraint, Separation-of-Duty, usage control
32David A. Basin, Samuel J. Burri, Günter Karjoth Dynamic Enforcement of Abstract Separation of Duty Constraints. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Nataliia Bielova, Fabio Massacci, Andrea Micheletti Towards Practical Enforcement Theories. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Thomas Scheffler, Stefan Geiß, Bettina Schnor An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu Security Enforcement Model for Distributed Usage Control. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter Policy enforcement and compliance proofs for Xen virtual machines. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machines, trusted computing, integrity management
32Osmar Marchi dos Santos, Andy J. Wellings Cost enforcement in the real-time specification for Java. Search on Bibsonomy Real Time Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fault-tolerance, Model checking, Real-time specification for Java, Java programming language
32Lu'ay A. Wahsheh, Jim Alves-Foss Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Saeed Parsa, Morteza Damanafshan Seamless Secure Development of Systems: From Modeling to Enforcement of Access Control Policies. Search on Bibsonomy AICCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Min Hong, Samuel W. J. Welch, John Trapp, Min-Hyung Choi Implicit Constraint Enforcement for Rigid Body Dynamic Simulation. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Chris Vanden Berghe, Matthias Schunter Privacy Injector - Automated Privacy Enforcement Through Aspects. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Adam Barth, John C. Mitchell Enterprise privacy promises and enforcement. Search on Bibsonomy WITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF policy summary, modal logic, privacy policy, P3P, EPAL
32Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations. Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Andy J. Wellings, Gregory Bollella, Peter C. Dibble, David Holmes Cost Enforcement and Deadline Monitoring in the Real-Time Specification for Java. Search on Bibsonomy ISORC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Min Hong, Samuel W. J. Welch, Min-Hyung Choi Intuitive Control of Dynamic Simulation Using Improved Implicit Constraint Enforcement. Search on Bibsonomy AsiaSim The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Steffen Jurk, Mira Balaban Improving Integrity Constraint Enforcement by Extended Rules and Dependency Graphs. Search on Bibsonomy DEXA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Swarup Reddi Integrity Constraint Enforcement in the Functional Database Language PFL. Search on Bibsonomy BNCOD The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
30Ali Alzahrani, Helge Janicke, Sarshad Abubaker Decentralized XACML Overlay Network. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF collaborative policy enforcement, decentralised policy enforcement, PDPs coordination
29Mihnea Andrei, Xun Cheng, Sudipto Chowdhuri, Curtis Johnson, Edwin Seputis Ordering, distinctness, aggregation, partitioning and DQP optimization in sybase ASE 15. Search on Bibsonomy SIGMOD Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF abstract plans, distinctness, eager aggregation, lazy aggregation, logical operators, logical properties, physical operators, property enforcement, optimization, search engine, aggregation, grouping, ordering, search space, operator model, physical properties
29Constantin Serban, Shmuel S. Tyszberowicz Enforcing Interaction Properties in AOSD-Enabled Systems. Search on Bibsonomy ICSEA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Law-Governed Architecture, Architecture, Aspects, AOSD, Enforcement
29Victoria Ungureanu Using certified policies to regulate E-commerce transactions. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Contract terms, Scalability, Enforcement
29Jeroen van Bemmel, Maarten Wegdam, Ko Lagerberg 3PAC: Enforcing Access Policies for Web Services. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Web Services security, policy enforcement, distributed access control
29Habtamu Abie, Pål Spilling, Bent Foyn A distributed digital rights management model for secure information-distribution systems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Self-protecting Objects, Privacy enforcement, Authentication, Authorization, Digital rights management
29Moni Naor, Benny Pinkas Efficient Trace and Revoke Schemes. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation
27Alexander Pretschner, Fabio Massacci, Manuel Hilty Usage Control in Service-Oriented Architectures. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang Secure information sharing enabled by Trusted Computing and PEI models. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF PEI models, secure information sharing, access control, authorization, trusted computing, security framework
27Hyun-Jeong Kim, Dong Hoon Lee 0001, Moti Yung Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Konstantin Beznosov Object Security Attributes: Enabling Application-Specific Access Control in Middleware. Search on Bibsonomy OTM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Aaron G. Cass, Leon J. Osterweil Design Guidance through the Controlled Application of Constraints. Search on Bibsonomy IWSSD The full citation details ... 2000 DBLP  BibTeX  RDF
27Deborah G. Johnson, Keith W. Miller 0001 Anonymity, pseudonymity, or inescapable identity on the net (abstract). Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Internet
27David J. Jankowski Computer-Aided Systems Engineering Methodology Support and Its Effect on the Output of Structured Analysis. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF computer-aided systems engineering, structured analysis, data flow diagram
27Yair Frankel, Moti Yung On Characterization of Escrow Encryption Schemes. Search on Bibsonomy ICALP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27Sören Preibusch Information Flow Control for Static Enforcement of User-Defined Privacy Policies. Search on Bibsonomy POLICY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF privacy policy enforcement, user-defined policies, JIF, privacy negotiations, electronic commerce, case-study, information flow control
27Shashank Shanbhag, Tilman Wolf Enforcement of Data-Plane Policies in Next-Generation Networks. Search on Bibsonomy POLICY The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data-plane policy enforcement, network services, automated planning, packet processing, next-generation Internet
27Matús Harvan, Alexander Pretschner State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, operating systems, information flow, usage control, system calls, reference monitor, enforcement
27Walter Chang, Brandon Streiff, Calvin Lin Efficient and extensible security enforcement using dynamic data flow analysis. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security enforcement, static analysis, dynamic data flow analysis
27David M. Eyers, Sriram Srinivasan 0002, Ken Moody, Jean Bacon Compile-Time Enforcement of Dynamic Security Policies. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Kilim, Dynamic security constraints, compile-time security enforcement
27Wei Zhou 0006, Christoph Meinel Function-Based Authorization Constraints Specification and Enforcement. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Access control, authorization constraints, constraints specification, constraints enforcement
27Adrián Perreau de Pinninck, Carles Sierra, W. Marco Schorlemmer Friends no more: norm enforcement in multiagent systems. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF norm enforcement, ostracism, trust
27Mahmoud Youssef, Nabil R. Adam, Vijayalakshmi Atluri Semantically enhanced enforcement of mobile consumer's privacy preferences. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile consumer, semantic enforcement, privacy, incentive
27Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette Visualization in law enforcement. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2005 DBLP  DOI  BibTeX  RDF crime analysis, crime network, spatial and temporal visualization, social network analysis, law enforcement, association network
27Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette Visualization in law enforcement. Search on Bibsonomy DG.O The full citation details ... 2005 DBLP  BibTeX  RDF crime analysis, crime network, spatial and temporal visualization, social network analysis, law enforcement, association network
27Patrick C. K. Hung, Kamalakar Karlapalem A Paradigm for Security Enforcement in CapBasED-AMS. Search on Bibsonomy CoopIS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security enforcement paradigm, CapBasED-AMS, capability-based event-driven activity management system, activity execution, problem-solving agent, multiple interdependent tasks, task execution, unauthorized modification, pilferage, illegal privacy violation, specification-time data, compile-time data, run-time data, system infrastructure, secure match-making, security constraints, task coordination model, security resource control, role-based resource security model, security policies, task scheduling, security of data, security threats, unauthorized access
27Joshua D. Guttman Filtering Postures: Local Enforcement for Global Policies. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF filtering postures, global policy local enforcement, global network access control, optimal service, network topology, security policy, routers, authorisation, packet filtering, prototype implementation
27Christoph F. Eick, Paul Werstein Rule-Based Consistency Enforcement for Knowledge-Based Systems. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF rule-based consistency enforcement, exception handlers, consistency constraints, rule entities, activation pattern controlled rule, data integrity, knowledge-based systems, knowledge based systems, system performance, consistency checks, application programs, production rule, forward chaining, knowledge-base management system
Displaying result #1 - #100 of 3573 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license