|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 10474 occurrences of 3799 keywords
|
|
|
Results
Found 18116 publication records. Showing 18116 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Danny C. C. Poo |
Policy Definition in Application-Domain-Related Classes. |
TOOLS (27) |
1998 |
DBLP DOI BibTeX RDF |
Software Maintenance, Policies, Business Rules, Classes, Object-Oriented Software Engineering |
32 | Jean-Phillipe Martin, Michael Hicks 0001, Manuel Costa, Periklis Akritidis, Miguel Castro 0001 |
Dynamically checking ownership policies in concurrent c/c++ programs. |
POPL |
2010 |
DBLP DOI BibTeX RDF |
security, testing, concurrency, debugging, tools, dynamic analysis |
32 | Bruce E. Hajek, Kevin Mitzel, Sichao Yang |
Paging and Registration in Cellular Networks: Jointly Optimal Policies and an Iterative Algorithm. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Christophe De Vleeschouwer, Pascal Frossard |
Dependent Packet Transmission Policies in Rate-Distortion Optimized Media Scheduling. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Jian Ni, Danny H. K. Tsang, Sekhar Tatikonda, Brahim Bensaou |
Optimal and Structured Call Admission Control Policies for Resource-Sharing Systems. |
IEEE Trans. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood |
Employees' Adherence to Information Security Policies: An Empirical Study. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Kris Verlaenen, Bart De Win, Wouter Joosen |
Policy Analysis Using a Hybrid Semantic Reasoning Engine. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Zvi Rosberg |
Asymptotically Optimal Power Control Policies for MMSE Multiuser Detector. |
Wirel. Networks |
2006 |
DBLP DOI BibTeX RDF |
random spreading sequence, MMSE multiuser detector, power control, CDMA, outage probability, fading channels |
32 | Romuald Thion, Stéphane Coulondre |
Modeling and Inferring on Role-Based Access Control Policies Using Data Dependencies. |
DEXA |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Raphael M. Bahati, Michael A. Bauer 0001, Elvis M. Vieira, O. K. Baek |
Using Policies to Drive Autonomic Management. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Sufyan Almajali, Tzilla Elrad |
Dynamic Network Policies Using Aspect Oriented Network Framework. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Matthew Caesar 0001, Jennifer Rexford |
BGP routing policies in ISP networks. |
IEEE Netw. |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Sankalp Kallakuri, Alex Doboli, Simona Doboli |
Stochastic Modeling Based Environment for Synthesis and Comparison of Bus Arbitration Policies. |
ISVLSI |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Ping Xuan, Victor R. Lesser |
Multi-agent policies: from centralized ones to decentralized ones. |
AAMAS |
2002 |
DBLP DOI BibTeX RDF |
agent comm languages and protocols, coordinating multi agents & activities, cooperation, action selection and planning, methodologies and tools |
32 | S. Dandamudi, C.-Y. Chow |
Performance of transaction scheduling policies for parallel database systems. |
ICDCS |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Hassan Takabi, Morteza Amini, Rasool Jalili |
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Humphrey |
Policy-Directed Data Movement in Grids. |
ICPADS (1) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Adam Wierman, Mor Harchol-Balter, Takayuki Osogami |
Nearly insensitive bounds on SMART scheduling. |
SIGMETRICS |
2005 |
DBLP DOI BibTeX RDF |
PSJF, preemptive shortest job first, scheduling, response time, processor sharing, M/G/1, SMART, SRPT, shortest remaining processing time, PS |
32 | Annie I. Antón, Julia Brande Earp |
A requirements taxonomy for reducing Web site privacy vulnerabilities. |
Requir. Eng. |
2004 |
DBLP DOI BibTeX RDF |
Security requirements, Privacy requirements |
32 | Yan-Nong Huang, Ming-Chien Shan |
Policy-Based Resource Management. |
CAiSE |
1999 |
DBLP DOI BibTeX RDF |
Interval-Based, Workflow, Policy, Query Rewriting, Resource |
32 | Ashok K. Thareja, Ashok K. Agrawala |
Characterization of an optimal delayed resolution policy. |
SIGMETRICS |
1983 |
DBLP DOI BibTeX RDF |
|
30 | Jeffrey A. Vaughan, Stephen Chong |
Inference of Expressive Declassification Policies. |
IEEE Symposium on Security and Privacy |
2011 |
DBLP DOI BibTeX RDF |
declassification policies, inference of security policies, information flow, language-based security |
30 | Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia |
QoP and QoS Policy Cognizant Module Composition. |
POLICY |
2010 |
DBLP DOI BibTeX RDF |
Policy-based software composition, Policies for software interfaces, Policies for aspect-oriented software |
30 | Marianne Winslett, Charles C. Zhang, Piero A. Bonatti |
PeerAccess: a logic for distributed authorization. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
logical signature, proof hints, release policies, P2P systems, distributed authorization, sticky policies |
30 | Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne |
Domain and Type Enforcement Firewalls. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP |
30 | Raymond J. Madachy |
System Dynamics Modeling of an Inspection-Based Process. |
ICSE |
1996 |
DBLP BibTeX RDF |
development phases, dynamic process factors, error flows, industrial data, inspection policies, inspection-based software lifecycle process, knowledge-based method, managerial policies, manpower allocation, personnel flows, process evaluation, quantitative process evaluation, software project dynamics, system dynamics modeling, task flows, scheduling, knowledge based systems, project management, quality, risk management, calibration, inspection, risk assessment, cost estimation, software development management, quality control, software cost estimation, project planning, human resource management, personnel |
30 | Nicholas Yialelis, Emil Lupu, Morris Sloman |
Role-based security for distributed object systems. |
WETICE |
1996 |
DBLP DOI BibTeX RDF |
role based security, multi organisational enterprise, role framework, obligation policies, domain based authentication service, replicated servers, minimal state, access control, distributed processing, role based access control, security policies, authorisation, security architecture, distributed object systems, access rights, symmetric cryptography, security agents |
30 | Brian Wongchaowart, Adam J. Lee |
Oblivious enforcement of hidden information release policies. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
distributed proof, hidden credentials, hidden policies |
30 | Heiko Klarl, Florian Marmé, Christian Wolff 0001, Christian Emig, Sebastian Abeck |
An MDA-Based Environment for Generating Access Control Policies. |
TrustBus |
2009 |
DBLP DOI BibTeX RDF |
Model-driven Development Process, Identity Management, Access Control Policies, Model-driven Security |
30 | Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor |
User-controllable learning of security and privacy policies. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
security and privacy policies, user-controllable learning, usable security |
30 | Jan Reineke 0001, Daniel Grund, Christoph Berg, Reinhard Wilhelm |
Timing predictability of cache replacement policies. |
Real Time Syst. |
2007 |
DBLP DOI BibTeX RDF |
Predictability, Timing analysis, Hard real-time systems, Cache replacement policies, Cache analysis |
30 | José Niño-Mora |
Marginal Productivity Index Policies for Admission Control and Routing to Parallel Multi-server Loss Queues with Reneging. |
NET-COOP |
2007 |
DBLP DOI BibTeX RDF |
loss queues, admission control, dynamic routing, multi-server, parallel queues, index policies |
30 | José Niño-Mora |
Marginal productivity index policies for scheduling a multiclass delay-/loss-sensitive queue. |
Queueing Syst. Theory Appl. |
2006 |
DBLP DOI BibTeX RDF |
Multiclass queue, Multi-queue switch, Delay-sensitive, Loss-sensitive, Restless bandits, Work-cost analysis, Index policies, Bias optimality, Scheduling, Conservation laws, Finite buffers |
30 | Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, Nahid Shahmehri |
Semantic Web Policies - A Discussion of Requirements and Research Issues. |
ESWC |
2006 |
DBLP DOI BibTeX RDF |
Integrated heterogeneous policies, Cooperative policy enforcement, Lightweight trust, Explanation mechanisms, Trust management, Natural language interfaces |
30 | Roland Rieke |
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection |
30 | Jay Ligatti, Lujo Bauer, David Walker 0001 |
Edit automata: enforcement mechanisms for run-time security policies. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Run-time checking and monitoring, Classification of security policies, Language-based security, Security automata |
30 | Arsalan Farrokh, Vikram Krishnamurthy |
Optimal Threshold Policies for Operation of a Dedicated-Platform with Imperfect State Information - A POMDP Framework. |
ECSQARU |
2005 |
DBLP DOI BibTeX RDF |
Partially Observable Markov Decision Process (POMDP), optimal threshold policies, Bellman equation, two-state Markov chain, overlook probability, dynamic programming, Hidden Markov Model (HMM), sufficient statistics, optimal search |
30 | Christian Guttmann, Ingrid Zukerman |
Voting policies that cope with unreliable agents. |
AAMAS |
2005 |
DBLP DOI BibTeX RDF |
unreliable team members, variable performance, voting policies, agent collaboration |
30 | J.-M. Bollon, Maria di Mascolo, Yannick Frein |
Unified Framework for Describing and Comparing the Dynamics of Pull Control Policies. |
Ann. Oper. Res. |
2004 |
DBLP DOI BibTeX RDF |
pull control policies, basestock, generalized kanban, extended kanban, (min,+) algebra, queueing systems |
30 | Stephen Chong, Andrew C. Myers |
Security policies for downgrading. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
information flow, security policies, noninterference, declassification, downgrading |
30 | Claudia Schremmer |
Empirical Evaluation of Boundary Policies for Wavelet-Based Image Coding. |
WAA |
2001 |
DBLP DOI BibTeX RDF |
Boundary Policies, Empirical Evaluation, Wavelet Analysis |
30 | André L. M. dos Santos, Richard A. Kemmerer |
Implementing Security Policies using the Safe Areas of Computation Approach. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
Safe Areas of Computation approach, business costs, SAC approach, Internet, Internet, World Wide Web, digital libraries, digital libraries, security policies, authorisation, information resources, telecommunication security, bank data processing, access control lists, online banks |
30 | Constantinos Maglaras |
Dynamic scheduling in multiclass queueing networks: Stability under discrete-review policies. |
Queueing Syst. Theory Appl. |
1999 |
DBLP DOI BibTeX RDF |
open multiclass queueing networks, discrete-review policies, scheduling, stability, fluid models |
30 | I-Lung Kao, Randy Chow |
Enforcing complex security policies for commercial applications. |
COMPSAC |
1995 |
DBLP DOI BibTeX RDF |
complex security policy enforcement, commercial applications, complex access control policies, multilevel security model, systematic frequently-desired multilevel exception categorization, commercial sectors, classified categories, Boolean functions, exception handling, security of data, authorisation, Boolean expressions |
29 | Hang Zhao, Jorge Lobo 0001, Steven M. Bellovin |
An Algebra for Integration and Analysis of Ponder2 Policies. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Apu Kapadia, Prasad Naldurg, Roy H. Campbell |
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Marco Casassa Mont, Filipe Beato |
On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Carlos Alberto Kamienski, Joseane Farias Fidalgo, Ramide Dantas, Djamel Sadok, Börje Ohlman |
XACML-Based Composition Policies for Ambient Networks. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Karl Quinn, David Lewis 0001, Declan O'Sullivan, Vincent P. Wade |
Trust Meta-Policies for Flexible and Dynamic Policy Based Trust Management. |
POLICY |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Pedro Gama, Paulo Ferreira 0001 |
Obligation Policies: An Enforcement Platform. |
POLICY |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Linying Su, David W. Chadwick, Andrew Basden, James A. Cunningham |
Automated Decomposition of Access Control Policies. |
POLICY |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Pranam Kolari, Li Ding 0001, Shashidhara Ganjugunte, Anupam Joshi, Timothy W. Finin, Lalana Kagal |
Enhancing Web Privacy Protection through Declarative Policies. |
POLICY |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Charles Riedesel, Eric D. Manley, Susan Poser, Jitender S. Deogun |
A model academic ethics and integrity policy for computer science departments. |
SIGCSE |
2009 |
DBLP DOI BibTeX RDF |
codes of conduct, integrity, policies, ethics |
29 | Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi |
Execution monitoring enforcement for limited-memory systems. |
PST |
2006 |
DBLP DOI BibTeX RDF |
bounded history automata, enforcement mechanisms, locally-testable properties, security policies, execution monitoring, edit automata |
29 | Brian M. Carlson, Lawrence W. Dowdy |
Static Processor Allocation in a Soft Real-Time Multiprocessor Environment. |
IEEE Trans. Parallel Distributed Syst. |
1994 |
DBLP DOI BibTeX RDF |
static processor allocation, soft real-time multiprocessor environment, parallelenvironment, static allocation policies, equal partitions, two partitions, 16-node iPSC/2hypercube, real-time systems, resource allocation, hypercube networks, multiprocessing programs |
29 | Lujo Bauer, Jay Ligatti, David Walker 0001 |
Composing expressive runtime security policies. |
ACM Trans. Softw. Eng. Methodol. |
2009 |
DBLP DOI BibTeX RDF |
policy-specification language, policy enforcement, Policy composition |
29 | Su-Hui Chiang, Sangsuree Vasupongayya |
Design and Potential Performance of Goal-Oriented Job Scheduling Policies for Parallel Computer Workloads. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Trilce Estrada, Olac Fuentes, Michela Taufer |
A distributed evolutionary method to design scheduling policies for volunteer computing. |
Conf. Computing Frontiers |
2008 |
DBLP DOI BibTeX RDF |
volatile systems, genetic algorithms, distributed systems, global computing |
29 | Nikhil Swamy, Brian J. Corcoran, Michael Hicks 0001 |
Fable: A Language for Enforcing User-defined Security Policies. |
SP |
2008 |
DBLP DOI BibTeX RDF |
verified enforcement, access control, information flow, provenance, Language-based security |
29 | Lalana Kagal, Tim Finin |
Modeling conversation policies using permissions and obligations. |
Auton. Agents Multi Agent Syst. |
2007 |
DBLP DOI BibTeX RDF |
Conversation policy, Conversation specifications, Speech act ontology, Agent communication, Permissions, Obligations, Ontology languages |
29 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati |
Access Control Policies and Languages in Open Environments. |
Secure Data Management in Decentralized Systems |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Kiyohiko Okayama, Nariyoshi Yamai, Hayato Ishibashi, Kota Abe, Toshio Matsuura |
An Efficient Management Method of Access Policies for Hierarchical Virtual Private Networks. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Qingfeng He, Paul N. Otto, Annie I. Antón, Laurie A. Jones |
Ensuring Compliance between Policies, Requirements and Software Design: A Case Study. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Anna V. Álvarez, Karen A. García, Raúl Monroy, Luis A. Trejo, Jesús Vázquez |
A Tool for Managing Security Policies in Organisations. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Evan Martin, Tao Xie 0001, Ting Yu 0001 |
Defining and Measuring Policy Coverage in Testing Access Control Policies. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Jonathan D. Pincus, Jeannette M. Wing |
Towards an Algebra for Security Policies. |
ICATPN |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Marco Antonio Montes de Oca, Leonardo Garrido, José-Luis Aguirre |
Effects of Inter-agent Communication in Ant-Based Clustering Algorithms: A Case Study on Communication Policies in Swarm Systems. |
MICAI |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Cédric Fournet, Andrew D. Gordon 0001, Sergio Maffeis |
A Type Discipline for Authorization Policies. |
ESOP |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Dakshi Agrawal, James Giles, Kang-Won Lee, Jorge Lobo 0001 |
Policy Ratification. |
POLICY |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Phan Minh Dung, Phan Minh Thang |
Trust Negotiation with Nonmonotonic Access Policies. |
INTELLCOMM |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Hubie Chen, Stephen Chong |
Owned Policies for Information Security. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Zeyad Ali, Qutaibah M. Malluhi |
Application-Controllable Policies in the NSM Distributed Mass Storage System. |
CLADE |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Ewen Denney, Bernd Fischer 0002 |
Correctness of Source-Level Safety Policies. |
FME |
2003 |
DBLP DOI BibTeX RDF |
program safety, code certification, Program verification, Hoare logic, proof-carrying code |
29 | Bianca Schroeder, Mor Harchol-Balter |
Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness. |
HPDC |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Ira A. Smith, Philip R. Cohen, Jeffrey Bradshaw, Mark Greaves, Heather Holmback |
Designing Conversation Policies using Joint Intention Theory. |
ICMAS |
1998 |
DBLP DOI BibTeX RDF |
|
29 | Latha S. Colby, Akira Kawaguchi, Daniel F. Lieuwen, Inderpal Singh Mumick, Kenneth A. Ross |
Supporting Multiple View Maintenance Policies. |
SIGMOD Conference |
1997 |
DBLP DOI BibTeX RDF |
|
29 | Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino |
A Unified Framework for Enforcing Multiple Access Control Policies. |
SIGMOD Conference |
1997 |
DBLP DOI BibTeX RDF |
|
29 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati |
Supporting Multiple Access Control Policies in Database Systems. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
|
29 | Su-Hui Chiang, Rajesh K. Mansharamani, Mary K. Vernon |
Use of Application Characteristics and Limited Preemption for Run-to-Completion Parallel Processor Scheduling Policies. |
SIGMETRICS |
1994 |
DBLP DOI BibTeX RDF |
|
29 | Zhen Liu 0001, Philippe Nain, Donald F. Towsley |
On optimal polling policies. |
Queueing Syst. Theory Appl. |
1992 |
DBLP DOI BibTeX RDF |
polling policy, optimal stochastic scheduling, coupling, Polling system, stochastic ordering |
29 | Scott T. Leutenegger, Mary K. Vernon |
The Performance of Multiprogrammed Multiprocessor Scheduling Policies. |
SIGMETRICS |
1990 |
DBLP DOI BibTeX RDF |
|
28 | Gregory Neven |
Privacy-enhanced access control in primelife. |
Digital Identity Management |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Steven Davy, Brendan Jennings, John Strassner |
Application domain independent policy conflict analysis using information models. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Adam Wierman, Misja Nuyens |
Scheduling despite inexact job-size information. |
SIGMETRICS |
2008 |
DBLP DOI BibTeX RDF |
job size estimates, scheduling, response time, queueing, M/G/1, SMART, SRPT, shortest remaining processing time |
28 | Jun Feng, Glenn S. Wasson, Marty Humphrey |
Resource usage policy expression and enforcement in grid computing. |
GRID |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Aaron D. Jaggard, Vijay Ramachandran |
Robust Path-Vector Routing Despite Inconsistent Route Preferences. |
ICNP |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Lalana Kagal, Timothy W. Finin |
Modeling Communicative Behavior Using Permissions and Obligations. |
AC |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Sivarama P. Dandamudi, K. C. Michael Lo |
A Hierarchical Load Sharing Policy for Distributed Systems. |
MASCOTS |
1997 |
DBLP DOI BibTeX RDF |
|
27 | Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi |
Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain MPLS Networks. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
PCE, Policies, Confidentiality, XACML |
27 | Marco Casassa Mont, Richard Brown 0001 |
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
Security Analytics, Simulation, Modelling, Decision Support, Security Policies, Risk Assessment, Access Management |
27 | Sören Preibusch |
Information Flow Control for Static Enforcement of User-Defined Privacy Policies. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
privacy policy enforcement, user-defined policies, JIF, privacy negotiations, electronic commerce, case-study, information flow control |
27 | JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu, Mine Altunay |
ACPT: A Tool for Modeling and Verifying Access Control Policies. |
POLICY |
2010 |
DBLP DOI BibTeX RDF |
Policy Testing, Access Control Policies, Policy Verification, Policy Modeling |
26 | David A. Basin, Felix Klaedtke, Samuel Müller 0002 |
Monitoring security policies with metric first-order temporal logic. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
access control, monitoring, temporal logic, security policies, compliance, separation of duty, usage control |
26 | Yi Wang, Min Zhang 0002 |
Penalty policies in professional software development practice: a multi-method field study. |
ICSE (2) |
2010 |
DBLP DOI BibTeX RDF |
penalty policies, perception and performance of software developers, software defects |
26 | Elisa Gebennini, Sara Dallari, Giuseppe Perrica, Andrea Grassi, Bianca Rimini, Cesare Fantuzzi |
Adoption of control policies in a simulative model for the design of AGV systems. |
SpringSim |
2009 |
DBLP DOI BibTeX RDF |
AGV system, design support systems, discrete event simulation, control policies |
26 | Francisco J. Arcelus, T. P. M. Pakkala, Gopalan Srinivasan |
Retailer's inventory policies for a one time only manufacturer trade deal of uncertain duration. |
Ann. Oper. Res. |
2008 |
DBLP DOI BibTeX RDF |
Inventory/marketing/production interface, Discount-duration uncertainty, Temporary-sales policies |
26 | Jackie Phahlamohlaka |
Globalisation and national security issues for the state: Implications for national ICT policies. |
HCC |
2008 |
DBLP DOI BibTeX RDF |
national ICT policies, information and communications technologies, security threats, Globalisation, national security |
26 | Benoît Combemale, Laurent Broto, Alain Tchana, Daniel Hagimont |
Metamodeling Autonomic System Management Policies - Ongoing Works. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Management policies, Autonomic computing, metamodeling, DSL |
26 | Martin Karusseit, Tiziana Margaria, Holger Willebrandt |
Policy expression and checking in XACML, WS-Policies, and the jABC. |
TAV-WEB |
2008 |
DBLP DOI BibTeX RDF |
model checking, access control, validation, policies |
26 | Carla Merkle Westphall, Joni da Silva Fraga |
Mandatory and Discretionary Policies for CORBA Security. |
J. Netw. Syst. Manag. |
2005 |
DBLP DOI BibTeX RDF |
CORBAsec, authorization, Security policies, common criteria, security evaluation |
Displaying result #101 - #200 of 18116 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|