The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase ws-security-policy (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1981-1989 (15) 1990-1992 (15) 1993-1995 (16) 1996-1997 (23) 1998 (19) 1999 (17) 2000 (37) 2001 (28) 2002 (46) 2003 (57) 2004 (47) 2005 (68) 2006 (91) 2007 (117) 2008 (104) 2009 (87) 2010 (44) 2011 (44) 2012 (32) 2013 (29) 2014 (26) 2015 (36) 2016 (58) 2017 (33) 2018 (45) 2019 (37) 2020 (39) 2021 (37) 2022 (27) 2023 (24) 2024 (4)
Publication types (Num. hits)
article(330) incollection(17) inproceedings(936) phdthesis(19)
Venues (Conferences, Journals, ...)
AMCIS(32) Comput. Secur.(30) ACSAC(25) SACMAT(23) HICSS(18) S&P(18) CoRR(17) ARES(14) CCS(14) Inf. Comput. Secur.(13) PACIS(13) ESORICS(12) SAC(11) POLICY(10) SEC(10) ACM Trans. Inf. Syst. Secur.(9) More (+10 of total 622)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1022 occurrences of 522 keywords

Results
Found 1302 publication records. Showing 1302 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
216Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
91Debabrata Nayak An Adaptive and Optimized Security Policy Manager for Wireless Networks. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network Element, Security Policy index, Security Policy Factor, SQoS, Policy optimizer
86Steven J. Greenwald E-Prime for security: a new security paradigm. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clark-Wilson, E-Prime, Sapir-Whorf hypothesis, disaster planning, enterprise security policy, general semantics, incident handling, informal security policy modeling, organizational security policy, principle of linguistic relativity, security life cycle, software life cycle SP800-12, user awareness, user centered security, user support and operations, modeling, formal methods, planning, RBAC, role-based access control, risk management, information assurance, security engineering, life cycle, spam detection, user training, security policy modeling, program management
73Padmalochan Bera, Soumya Kanti Ghosh 0001, Pallab Dasgupta Formal Verification of Security Policy Implementations in Enterprise Networks. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access control list (ACL), Formal Verification, Network security, Security Policy
72Yi-Ming Chen 0008, Yung-Wei Kao Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information flow, security policy, Colored Petri Nets, SELinux
69Yiwen Liang, Wenjun Deng Verify Consistency between Security Policy and Firewall Policy with Answer Set Programming. Search on Bibsonomy CSSE (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
65Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix Security policy compliance with violation management. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF labeled kripke structure, temporal logic, security policy, deontic logic, violation
65Nazim Benaïssa, Dominique Cansell, Dominique Méry Integration of Security Policy into System Modeling. Search on Bibsonomy B The full citation details ... 2007 DBLP  DOI  BibTeX  RDF integration, refinement, security policy
64Igor V. Kotenko, Artem Tishkov, Olga Chervatuk, Ekaterina Sidelnikova Security Policy Verification Tool for Geographical Information Systems. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, verification, security policy
62Patrick C. K. Hung, Guang-Sha Qiu Specifying conflict of interest assertions in WS-policy with Chinese wall security policy. Search on Bibsonomy SIGecom Exch. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF WS-policy attachment, security assertion, XML, security policy, delegation, matchmaking, conflict of interest, WS-policy, service locators, Chinese wall security policy
61Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang Design and implementation of a tool for analyzing SELinux secure policy. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security policy configuration, security policy description language, SELinux, integrity verification
59Maxim Schnjakin, Michael Menzel 0001, Christoph Meinel A pattern-driven security advisor for service-oriented architectures. Search on Bibsonomy SWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ws-security-policy, security, web service, soa
55Chenghua Tang, Shunzheng Yu Assessment of Network Security Policy Based on Security Capability. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Rasool Jalili, Mohsen Rezvani Specification and Verification of Security Policies in Firewalls. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Formal Specification, Security Policy, Firewall
54Fumiko Satoh, Takehiro Tokuda Security Policy Composition for Composite Services. Search on Bibsonomy ICWE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
53Saravanan Muthaiyah, Larry Kerschberg Virtual organization security policies: An ontology-based integration approach. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security policy ontology, Security policy domain model, Ontology mapping, Semantic mapping
52Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood Employees' Behavior towards IS Security Policy Compliance. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Phu H. Phung, David Sands 0001 Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security policy enforcement, vehicle software, middleware, Aspect-oriented programming, OSGi, reference monitors
50Won Young Lee, Hee Suk Seo, Tae Ho Cho Modeling of Policy-Based Network with SVDB. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PBNM (Policy-based Network Management), simulation, Data Mining, network security, Security Policy, DEVS formalism
49Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao A Network Security Policy Model and Its Realization Mechanism. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, Security policy, domain, rule engine
49Stephen S. Yau, Zhaoji Chen Security Policy Integration and Conflict Reconciliation for Collaborations among Organizations in Ubiquitous Computing Environments. Search on Bibsonomy UIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security policy integration, conflict reconciliation, organization collaboration, similarity-based policy adaptation, negotiation-based policy reconciliation, ontology, ubiquitous computing environments
48James Bret Michael, Vanessa L. Ong, Neil C. Rowe Natural-Language Processing Support for Developing Policy-Governed Software Systems. Search on Bibsonomy TOOLS (39) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
48Patrick D. McDaniel, Atul Prakash 0001 Methods and limitations of security policy reconciliation. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security policy
48Michael J. Petkac, Lee Badger Security Agility in Response to Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security agility, cooperative frameworks, malicious attacks, mission critical functionality, security policy reconfiguration, runtime security policy change, prototype toolkit, flexible host-based response, distributed systems, intrusion detection, distributed processing, software components, security of data
45George Yee, Larry Korba Negotiated Security Policies for E-Services and Web Services. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Fumiko Satoh, Yumi Yamaguchi Generic Security Policy Transformation Framework for WS-Security. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Frédéric Cuppens, Claire Saurel Specifying a security policy: a case study. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF high risk environment, interoperability problems, logic-based approach, formal specification, consistency, completeness, security of data, formal logic, deontic logic, security policy specification
44Vijay Varadharajan Network Security Policy Models. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
44Symon Chang, Qiming Chen, Meichun Hsu Managing Security Policy in a Large Distributed Web Services Environment. Search on Bibsonomy COMPSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44Geon Woo Kim 0001, So-Hee Park, Jaehoon Nah, Sung Won Sohn Security Policy Deployment in IPsec. Search on Bibsonomy ICOIN (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
44Myla Archer, Elizabeth I. Leonard, Matteo Pradella Modeling Security-Enhanced Linux Policy Specifications for Analysis. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis An Ontology-Based Approach to Information Systems Security Management. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IS Security, Security Policy, Security Management, Security Ontology
43Mohamad Aljnidi, Jean Leneutre A security policy system for mobile autonomic networks. Search on Bibsonomy Autonomics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security policy management, ad-hoc networks, autonomic computing, security models, autonomic networks
42Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. Search on Bibsonomy POLICY The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41John P. McDermott, Leo Freitas A formal security policy for xenon. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF refinement, open-source, z, csp, hypervisor, information-flow security, circus
41Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia Enabling automated threat response through the use of a dynamic security policy. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe Maintaining Consistency of the Security Policy using Timestamp Ordering. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Performance, Concurrency control, Security policy, Consistency control, Timestamp ordering
40David F. Ferraiolo, Vijay Atluri A meta model for access control: why is it needed and is it even possible to achieve? Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Fuwen Liu, Hartmut König Security Policy Management for Peer Group Meetings. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Pierre-Alain Masson, Jacques Julliand, Jean-Chritophe Plessis, Eddie Jaffuel, Georges Debois Automatic generation of model based tests for a class of security properties. Search on Bibsonomy A-MOST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security policy, automatic test generation, security properties
38Tejeddine Mouelhi, Franck Fleurey, Benoit Baudry, Yves Le Traon A Model-Based Framework for Security Policy Specification, Deployment and Testing. Search on Bibsonomy MoDELS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Model-driven engineering methodology, Security, Metamodeling
38Almut Herzog, Nahid Shahmehri A Usability Study of Security Policy Management. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Charles R. Young A security policy for a profile-oriented operating system. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
38Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby Semantic context aware security policy deployment. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, network security, PDP, PEP
38Moon Sun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim, Jinoh Kim Applying Data Mining Techniques to Analyze Alert Data. Search on Bibsonomy APWeb The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38George Yee Personalized Security for E-Services. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Security, Security Policy, Firewalls, Anomalies, Packet Filters
37Laurent George 0002, Valérie Viet Triem Tong, Ludovic Mé Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga Security policy validation using temporal executable specifications. Search on Bibsonomy SMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Petros Efstathopoulos, Eddie Kohler Manageable fine-grained information flow. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF decentralized information flow control, debugging, labels, policy language
37Kouichi Ono, Yuichi Nakamura 0003, Fumiko Satoh, Takaaki Tateishi Verifying the Consistency of Security Policies by Abstracting into Security Types. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Igor V. Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov Hybrid Multi-module Security Policy Verification. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Klaus Peter Fischer, Udo Bleimann, Steven Furnell Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Business Process Execution Language (BPEL), Grid Processes, Security Policy Enforcement, Virtual Organizations, Grid Services, Information Flow Analysis
36Xiaodong Yi 0002, Xuejun Yang A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Information Flow Security Policy, Security Verification, Secure Operating System
36Nils Gruschka, Meiko Jensen, Torben Dziuk Event-based application of ws-security policy on soap messages. Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF event-based processing, web services, WS-security
36Sid Stamm, Brandon Sterne, Gervase Markham Reining in the web with content security policy. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF content restrictions, security policy, http, web security
36Teo Poh Kuang, Hamidah Ibrahim Security privacy access control for policy integration and conflict reconciliation in health care organizations collaborations. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conflict reconciliation, cross-organization collaboration, security policy integration, role-based access control, logical reasoning
35Patrick D. McDaniel, Atul Prakash 0001 Methods and Limitations of Security Policy Reconciliation. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Raj Mohan, Timothy E. Levin, Cynthia E. Irvine An Editor for Adaptive XML-Based Policy Management of IPsec. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Xuhui Ao, Naftaly H. Minsky Flexible Regulation of Distributed Coalitions. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed coalition, Decentralized regulatory mechanism, Policy hierarchy, Policy interoperability, Security policy, Law-Governed Interaction
34Patrick D. McDaniel, Atul Prakash 0001 A Flexible Architecture for Security Policy Enforcement. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Gustavo A. Santana Torrellas A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren Security policy analysis using deductive spreadsheets. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SELinux policy, security policy analysis, vulnerability analysis
34Matthias Schwan An extended model of security policy for multi-applicative smart cards. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF biometrics, smart cards, security policy, electronic signatures
34Rodolphe Ortalo A Flexible Method for Information System Security Policy Specification. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF information systems, deontic logic, security policy specification
34Christos Fragos, Maria Karyda 0001, Evangelos A. Kiountouzis Using the Lens of Circuits of Power in Information Systems Security Management. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information systems security management, Circuits of Power Framework, power, security policy
34Geon Woo Kim 0001, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim Security Framework for Home Network: Authentication, Authorization, and Security Policy. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Authentication, Access Control, Authorization, Security Policy, Home Network
34Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono Simplifying security policy descriptions for internet servers in secure operating systems. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF policy description, SELinux, internet server, secure operating system
34George Angelis, Stefanos Gritzalis, Costas Lambrinoudakis Security Policy Configuration Issues in Grid Computing Environments. Search on Bibsonomy SAFECOMP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Heng Yin 0001, Haining Wang Building an application-aware IPsec policy system. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IP, computer network security, communication system security
34Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan A Novel Quantitative Approach For Measuring Network Security. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34William R. Claycomb, Rodrigo Lopes, Dongwan Shin, Byunggi Kim A group-based security policy for wireless sensor networks. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless sensor network, access control, security policy
34Sachoun Park, Gihwon Kwon Verification of UML-Based Security Policy Model. Search on Bibsonomy ICCSA (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Formal verification, Role-based access control, Visual specification, Security policy model
34Ross J. Anderson A Security Policy Model for Clinical Information Systems. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF personal health information protection, medical ethics, privacy threats, restricted user numbers, restricted record numbers, strong notification property enforcement, localized information exposure, private banking, intelligence data management, security of data, data privacy, medical information systems, information flow control, DP management, clinical information systems, security policy model
34Laurence Cholvy, Frédéric Cuppens Analyzing Consistency of Security Policies. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security policy consistency analysis, deontic formulae, normative conflicts, role priorities, methodology, problem solving, roles, formal language, security of data, regulation, formal logic
33Sharman Lichtenstein Developing Internet Security Policy for Organizations. Search on Bibsonomy HICSS (4) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
33Patrick C. K. Hung, Guang-Sha Qui Implementing conflict of interest assertions in WS-policy with separation of duties for Web-Services matchmaking process. Search on Bibsonomy Inf. Syst. E Bus. Manag. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Matchmaking process, Separation of duties, Conflict of interest, WS-policy, Chinese wall security policy
33Patrick C. K. Hung, Guang-Sha Qiu Implementing Conflict of Interest Assertions for Web Services Matchmaking Process. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF WS-PolicyAttachment, Matchmaking, Conflict of interest, WS-Policy, Service locators, Chinese wall security policy
32Michael Manley, Cheri McEntee, Anthony Molet, Joon S. Park Towards an Effective Wireless Security Policy for Sensitive Organizations. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Peter Herrmann Formal Security Policy Verification of Distributed Component-Structured Software. Search on Bibsonomy FORTE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Rudolf Schreiner, Ulrich Lang 0001 Protection of complex distributed systems. Search on Bibsonomy Middleware Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF service oriented architecture, distributed systems security, model driven security
32Satoru Tezuka, Ryôichi Sasaki, Masanori Kataoka Seamless Object Authentication in Different Security Policy Domains. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32M. Nash, R. J. Kennett Implementing Security Policy in a Large Defense Procurement. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
32Aneta Poniszewska-Maranda Security Constraints in Access Control of Information System Using UML Language. Search on Bibsonomy WETICE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Thomas Hardjono, Hugh Harney Group Security Policy Management for IP Multicast and Group Security. Search on Bibsonomy NETWORKING The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Kuong-Ho Chen, Yuan-Siao Liu, Tzong-Jye Liu, Chyi-Ren Dow ZERO-Conflict: A Grouping-Based Approach for Automatic Generation of IPSec/VPN Security Policies. Search on Bibsonomy DSOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IP security, network management, security policy, security requirement, policy conflict
32Handan Gül Çalikli, M. Ufuk Çaglayan A Formal Policy Specification Language for an 802.11 WLAN with Enhanced Security Network. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Administrative Domain, 802.11 Wireless Local Area Network (WLAN), Mobadtl, Security Policy
32Manfred Holzbach Security Measures For The Austrian "Paychip" Electronic Purse Application. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF PAYCHIP, management-oriented description, Austrian nationwide electronic purse scheme, QUICK scheme, national security policy, security level evaluation, payment security maintenance, chip-card based payment infrastructure, Europay Austria, security of data, design principles, security measures
31Subhendu Aich, Shamik Sural, Arun K. Majumdar Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Spatiotemporal event, Policy connectives, Location hierarchy, RBAC
31Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith Pastures: Towards Usable Security Policy Engineering. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Sook-Yeon Kim, Myung-Eun Kim, Kiyoung Kim, Jongsoo Jang Information Model for Policy-Based Network Security Management. Search on Bibsonomy ICOIN (1) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Mahdi Seify New Method for Risk Management in CRM Security Management. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Information Security Management System (ISMS), Data management, Risk Management, Customer Relationship Management (CRM)
31Robert Grimm 0001, Brian N. Bershad Separating access control policy, enforcement, and functionality in extensible systems. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF access check, policy-neutral enforcement, protection domain transfer, Java, security policy, auditing, SPIN, extensible systems, protection domain
30Klaus Peter Fischer, Udo Bleimann, Woldemar F. Fuhrmann, Steven Furnell Security Policy Enforcement in BPEL-Defined Collaborative Business Processes. Search on Bibsonomy ICDE Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Boniface Hicks, Kiyan Ahmadizadeh, Patrick D. McDaniel From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Minji Kim, Younghee Lee TDM: Enforcement of Security Management System for XML-Centric Electronic Commerce. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Brian Shand, Jem Rashbass Security for middleware extensions: event meta-data for enforcing security policy. Search on Bibsonomy Middleware Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF middleware, extensions, policy specification
30Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt Formal Reasoning About Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verification, formal method, Intrusion detection, security policy
30Xiaofeng Gong, Julian Newman The Role of Deontic Concepts and Commitment in the Policy Specification of Mobile Computing Environment. Search on Bibsonomy OTM Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF deontic concepts, speech acts oriented communication, mobile computing, Commitment, commitments, security policy specification
30Joshua D. Guttman Filtering Postures: Local Enforcement for Global Policies. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF filtering postures, global policy local enforcement, global network access control, optimal service, network topology, security policy, routers, authorisation, packet filtering, prototype implementation
Displaying result #1 - #100 of 1302 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license