|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Yungseon Eo, Seongkyun Shin, William R. Eisenstadt, Jongin Shim |
Generalized traveling-wave-based waveform approximation technique for the efficient signal integrity verification of multicoupled transmission line system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 21(12), pp. 1489-1497, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Wei Li, Richard T. Snodgrass, Shiyan Deng, Vineel Kumar Gattu, Aravindan Kasthurirangan |
Efficient Sequenced Integrity Constraint Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 17th International Conference on Data Engineering, April 2-6, 2001, Heidelberg, Germany, pp. 131-140, 2001, IEEE Computer Society, 0-7695-1001-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Charanjit S. Jutla |
Encryption Modes with Almost Free Message Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 529-544, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Can Türker, Gunter Saake |
Deriving Relationships between Integrity Constraints for Schema Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADBIS ![In: Advances in Databases and Information Systems, Second East European Symposium, ADBIS'98, Poznan, Poland, Spetember 7-10, 1998, Proceedings, pp. 188-199, 1998, Springer, 3-540-64924-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
29 | R. M. Alzahrani, M. A. Qutaishat, Nick J. Fiddian, W. A. Gray |
Integrity Management in an Object-Oriented Federated Database Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advances in Databases, 13th British National Conference on Databases, BNCOD 13, Manchester, United Kingdom, July 12-14, 1995, Proceedings, pp. 226-248, 1995, Springer, 3-540-60100-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
29 | Paul W. P. J. Grefen, Jan Flokstra |
Parallel Handling of Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRISMA Workshop ![In: Parallel Database Systems, PRISMA Workshop, Noordwijk, The Netherlands, September 24-26, 1990, Proceedings, pp. 242-258, 1990, Springer, 3-540-54132-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
29 | Norbert Südkamp, Peter Kandzia |
Enforcement of Integrity Constraints in a Semantic Data Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSL ![In: CSL '88, 2nd Workshop on Computer Science Logic, Duisburg, Germany, October 3-7, 1988, Proceedings, pp. 313-328, 1988, Springer, 3-540-51659-X. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
28 | Hamidah Ibrahim, Ali Amer Alwan, Nur Izura Udzir |
Checking Integrity Constraints with Various Types of Integrity Tests for Distributed Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), 3-6 December 2007, Adelaide, Australia, pp. 151-152, 2007, IEEE Computer Society, 0-7695-3049-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Krishna Srinivasan, P. Muthana, Rohan Mandrekar, Ege Engin, Jinwoo Choi, Madhavan Swaminathan |
Enhancement of Signal Integrity and Power Integrity with Embedded Capacitors in High-Speed Packages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 7th International Symposium on Quality of Electronic Design (ISQED 2006), 27-29 March 2006, San Jose, CA, USA, pp. 284-291, 2006, IEEE Computer Society, 0-7695-2523-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Stephen Flowerday, Rossouw von Solms |
Real-time information integrity = system integrity + data integrity + continuous assurances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 24(8), pp. 604-613, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane |
Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 1-11, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Bhavani Thuraisingham |
Grand Challenges in Data Integrity and Quality: Panel Discussion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 249-253, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Naren Kodali, Csilla Farkas, Duminda Wijesekera |
Enforcing Integrity in Multimedia Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 67-81, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Alexandre Aellig, Philippe Oechslin |
Tracing Attacks and Restoring Integrity with Lascar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 115-124, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Belal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nasir Sulaiman |
An Efficient OODB Model for Ensuring the Integrity of User-Defined Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 195-208, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Herman Balsters, Bert O. de Brock |
Integration of Integrity Constraints in Database Federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 143-158, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Michael Gertz 0001, George Csaba |
Monitoring Mission Critical Data for Integrity and Availability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 189-201, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
28 | Geri Georg, Robert B. France, Indrakshi Ray |
Designing High Integrity Systems Using Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 37-57, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
28 | Detlef Kraus |
Integrity Mechanisms in German and International Payment Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 175-187, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
28 | Stefan Böttcher |
Concurrent Checking of Global Cross-database Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 3-19, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
28 | Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka |
Protecting Java Component Integrity Against Trojan Horse Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 99-113, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
28 | Madhavan K. Nayar |
The information integrity imperative. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 187-194, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
28 | Jim Jones |
Integrity and internal control in modern banking systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 57-76, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
28 | Cynthia E. Irvine, Timothy E. Levin |
A cautionary note regarding the data integrity capacity of certain secure systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 3-26, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
28 | Paul Ammann, Sushil Jajodia |
The Integrity Challenge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 59-70, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
28 | Paloma Díaz 0001, Ignacio Aedo, Fivos Panetsos |
Definition of Integrity Policies For Web-based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 85-98, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
28 | Piet J. M. Poos |
Complex IT Environments: Ascertaining Information Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 121-146, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
28 | Wouter J. Keller, Roel G. J. Rot |
Integrity and Internal Control in a Statistical Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 71-84, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
28 | Vijay V. Mandke, Madhavan K. Nayar |
Implementing Information Integrity Technology - A Feedback Control System Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 23-40, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
28 | Martin Stanek, Daniel Olejár |
Integrity Testing in WWW Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 111-120, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
28 | Lars Frank |
Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 147-158, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
28 | Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards |
Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 41-58, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
28 | Arnon Rosenthal, Edward Sciore |
Propagating Integrity Information among Interrelated Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 5-18, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
28 | Vijayalakshmi Atluri |
Modification of Integrity Constraints Through Knowledge Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 191-209, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
28 | L. G. Gomez, Susan Darling Urban |
Integrity Constraint Enforcement in a Multidatabase Using Distributed Active Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 19-39, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
28 | Vijay V. Mandke, Madhavan K. Nayar |
Design Basis for Achieving Information Integrity - a Feedback Control System Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 169-190, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
28 | Quazi N. Ahmed, Susan V. Vrbsky |
Maintaining Integrity Constraints and Security in real-Time Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 255-270, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
28 | Frédéric Cuppens, Claire Saurel |
A Logical Formalization of Integrity Policies for Database Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 231-254, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
28 | Michael Gertz 0001 |
Managing Data Quality and Integrity in Federated Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 211-230, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
28 | Kamalasen Rajalingham, David Chadwick |
Integrity Control of Spreadsheets: Organisation & Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 147-168, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
28 | Andrew E. Wade |
Integrity: Do you know where your Objects Are? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 203-215, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | William List |
Detecting Data Integrity Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 341-348, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | Leon Strous |
Integrity: Definition, Subdivision, Challenge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 187-194, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | David Chadwick, Joan Knight, Phil Clipsham |
Information Integrity in End-User Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 273-292, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | Robert Moeller |
Changing Definitions of Internal Control and Information Systems Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 255-272, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | William List |
The Effects of Time on Integrity in Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 349-358, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | A. W. Neisingh |
Control of Information and Communication Technology: An Integrity Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 253-254, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | Amit P. Sheth |
Managing with Less than Absolute Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 195-202, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | Maria Amélia Pacheco e Silva |
Dynamic Integrity Constraints Definition and Enforcement in Databases: A Classification Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 65-87, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | Youssef Lahlou |
A Model for Specifying Individual Integrity Constraints on Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 217-235, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | Kyuwoong Lee, Seog Park |
Optimistic Concurrency Control for Maintaining the Global Integrity Constraint in MDBSs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 131-151, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | François Bry |
Query Answering in Information Systems with Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 113-130, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | William List, W. R. Melville |
Integrity in Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 295-340, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | Patrizia Asirelli |
View Constraints: An Interpretation of Integrity Constraints for Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 237-252, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | Gerhard Knolmayer, Thomas Buchberger |
Maintaining Temporal Integrity of World Wide Web pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 43-63, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
28 | Matti Tenhunen |
The Integrity of Electronic Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 153-186, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
26 | Hamdy S. Soliman, Mohammed Omari |
Application of synchronous dynamic encryption system in mobile wireless domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'05 - Proceedings of the First ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005, pp. 24-30, 2005, ACM, 1-59593-241-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
dynamic encryption, flexible integrity, integrity violations, mobile network security, permutation vectors, seamless handover |
26 | Wei-Je Huang, Edward J. McCluskey |
Transient errors and rollback recovery in LZ compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 2000 Pacific Rim International Symposium on Dependable Computing (PRDC 2000), 18-20 December 2000, Los Angeles, CA, USA, pp. 128-138, 2000, IEEE Computer Society, 0-7695-0975-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
LZ compression, Lempel-Ziv compression, compressed codewords, rollback error recovery schemes, data integrity, data integrity, fault tolerant computing, data compression, error detection, system recovery, transient faults, rollback recovery, compression ratio, lossless data compression, transient errors, data reconstruction, hardware redundancy |
26 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 270-277, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
26 | Reiner Sailer, Matthias Kabatnik |
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 373-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
history-based distributed filtering, network-level access control, nondiscretionary access control model, data packet exchange, subversive channels, secrecy requirements, trustworthiness validation, data integrity, data integrity, tagging, packet switching, data communication, authorisation, electronic data interchange, telecommunication security, data transmission, context information, telecommunication network management, security levels, state information, security labels, subnetworks |
26 | John Patrick McGregor, Ruby B. Lee |
Performance Impact of Data Compression on Virtual Private Network Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 500-510, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s |
26 | Nina Edelweiss, Patrícia Nogueira Hubler, Mirella Moura Moro, Giovani Demartini |
A Temporal Database Management System Implemented on top of a Conventional Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCCC ![In: 20st International Conference of the Chilean Computer Science Society (SCCC 2000), 16-18 November 2000, Santiago, Chile, pp. 58-67, 2000, IEEE Computer Society, 0-7695-0810-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
conventional database, state transition rules, temporal integrity, query processing, query processing, specification, relational databases, relational database, data integrity, SQL, SQL, data models, temporal databases, temporal database, data representation, temporal query language, temporal data models, data definition |
26 | Krishna Kant 0001 |
Performance of internal overload controls in large switches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 28st Annual Simulation Symposium (SS '95), April 25-28, 1995, Santa Barbara, California, USA, pp. 228-, 1995, IEEE Computer Society, 0-8186-7091-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
internal overload control performance, large switches, switch sizes, call capacity, voice circuits, overload performance, network integrity, peripheral scanning schemes, scheduling, performance evaluation, virtual machines, logic CAD, circuit analysis computing, simulation model, service integrity, buffer sizes, switching circuits |
26 | Venkataraman Ramesh, Sudha Ram |
A methodology for interschema relationship identification in heterogeneous databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (3) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 263-272, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
interschema relationship identification, data access techniques, federated schemas, schematic knowledge, integrity constraint knowledge, constraint-based relationships, schematic relationships, interoperability, heuristics, data integrity, distributed databases, database theory, information sharing, open systems, heterogeneous databases, schema integration |
26 | Jason Gait |
Optimizing Unix Database File Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 11(3), pp. 48-56, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Unix database file operations optimization, Ratfiles, Rational File System, Unix kernel, atomic write, write-order discipline, data integrity, data integrity, optimisation, database management systems, Unix |
26 | Luqi |
A Graph Model for Software Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(8), pp. 917-927, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
automatic assistance, integrity, graph theory, data integrity, software tools, consistency, software evolution, automatic programming, graph model, complex software systems, evolving software system, automated support |
26 | Bruno Ciciani, Daniel M. Dias, Balakrishna R. Iyer, Philip S. Yu |
A Hybrid Distributed Centralized System Structure for Transaction Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(8), pp. 791-806, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
hybrid distributed centralized system structure, central system, non-local data, transaction processing applications, reservation systems, coherency control protocol, local transactions, distributed systems, concurrency, integrity, locality, data integrity, distributed processing, concurrency control, transaction processing, banking, remote accesses, insurance |
25 | Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres |
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 1-22, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks |
25 | Mazleena Salleh, Teoh Chin Yew |
Application of 2D Barcode in Hardcopy Document Verification System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 644-651, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hardcopy document, verification, integrity |
25 | Abid Khan, Qasim Arshad, Xiamu Niu, Yong Zhang 0023, Muhammad Waqas Anwar |
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 223-228, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Graph head Sealing, execution integrity, security properties, Mobile Agent security, malicious hosts, active attacks |
25 | Lingli Deng, Yeping He, Ziyao Xu |
Trusted Reputation Management Service for Peer-to-Peer Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2008, OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II, pp. 1069-1086, 2008, Springer, 978-3-540-88872-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data integrity, virtual machine, P2P, trusted computing, reputation management |
25 | Dolors Costal, Cristina Gómez 0001, Anna Queralt, Ernest Teniente |
Drawing Preconditions of Operation Contracts from Conceptual Schemas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 20th International Conference, CAiSE 2008, Montpellier, France, June 16-20, 2008, Proceedings, pp. 266-280, 2008, Springer, 978-3-540-69533-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
operation contracts, conceptual modelling, integrity constraints |
25 | Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi |
A Demonstrative Ad Hoc Attestation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 17-30, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Kiosk computing, platform integrity, smart cards, Trusted computing, attestation |
25 | Wen-Chao Yang, Che-Yen Wen, Chung-Hao Chen |
Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 278-287, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Integrity, Public-key Cryptography, Digital Image, Credibility, Digital Image Forensic |
25 | Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia |
Decentralized authorization and data security in web content delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 1654-1661, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
web, data integrity, authorization, content delivery networks |
25 | Alessandro Fantechi, Stefania Gnesi, Laura Semini |
Achieving Fault Tolerance by a Formally Validated Interaction Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RODIN Book ![In: Rigorous Development of Complex Fault-Tolerant Systems [FP6 IST-511599 RODIN project], pp. 133-152, 2006, Springer, 3-540-48265-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Integrity policies, fault tolerance, model checking, process algebras |
25 | Mihai Budiu, Úlfar Erlingsson, Martín Abadi |
Architectural support for software-based protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASID ![In: Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, ASID 2006, San Jose, California, USA, October 21, 2006, pp. 42-51, 2006, ACM, 1-59593-576-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
control-flow integrity, software fault isolation, security, control-flow graph, hardware support, memory protection, binary rewriting |
25 | Zhongwen Li |
Security and Safety Assurance Architecture: Model and Implementation (Supporting Multiple Levels of Criticality). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Distributed and Parallel Computing, 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005, Proceedings, pp. 363-369, 2005, Springer, 3-540-29235-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Safety Kernel, Security and Safety Assurance Architecture, Integrity Policy for Criticality, Distributed Control System |
25 | Ilaria Venturini |
Counteracting Oracle attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 187-192, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
integrity watermarking, oracle attack, security, covert channel, semi-fragile watermarking |
25 | Xavier C. Delannoy |
Understanding the Tension between Transition Rules and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advances in Databases, 14th British National Conferenc on Databases, BNCOD 14, Edinburgh, UK, July 3-5, 1996, Proceedings, pp. 92-106, 1996, Springer, 3-540-61442-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Discretionary Models of Confidentiality, Transition Integrity Constraints, Relational Model, Covert Channel |
25 | Narayanan Krishnakumar, Arthur J. Bernstein |
Bounded Ignorance: A Technique for Increasing Concurrency in a Replicated System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 19(4), pp. 586-625, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
concurrency control, replication, integrity constraints, reachability analysis, serializability |
25 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 216-231, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
25 | Yi Lin 0005, Bettina Kemme, Ricardo Jiménez-Peris, Marta Patiño-Martínez, José Enrique Armendáriz-Iñigo |
Snapshot isolation and integrity constraints in replicated databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 34(2), pp. 11:1-11:49, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Replication, integrity constraints, snapshot isolation |
25 | Tennyson X. Chen, Martin D. Meyer, Nanthini Ganapathi |
Implementation considerations for improving data integrity in normalized relational databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009, 2009, ACM, 978-1-60558-421-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
data integrity functional independency, decomposition, normalization, functional dependency |
25 | Vincenzo De Florio, Chris Blondia |
Adaptive Data Integrity through Dynamically Redundant Data Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1213-1218, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data structures, data integrity, Redundancy |
25 | Hamidah Ibrahim, Zarina Dzolkhifli, Praveen Madiraju |
A Model for Checking the Integrity Constraints of Mobile Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems: OTM 2008 Workshops, OTM Confederated International Workshops and Posters, ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS 2008, Monterrey, Mexico, November 9-14, 2008. Proceedings, pp. 548-560, 2008, Springer, 978-3-540-88874-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integrity constraints, Mobile databases, constraint checking |
25 | Keisuke Fujita, Yuki Ashino, Tetsutaro Uehara, Ryôichi Sasaki |
Using Boot Control to Preserve the Integrity of Evidence. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 61-74, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Evidence integrity, hysteresis signatures, boot control |
25 | Matteo Bordin, Thanassis Tsiodras, Maxime Perrotin |
Experience in the Integration of Heterogeneous Models in the Model-driven Engineering of High-Integrity Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe 2008, 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedings, pp. 171-184, 2008, Springer, 978-3-540-68621-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Model-driven Integration, High-Integrity Systems, Automated Code Generation |
25 | Keith B. Frikken, Joseph A. Dougherty IV |
An efficient integrity-preserving scheme for hierarchical sensor aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 68-76, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secure aggregation, sensor networks, integrity |
25 | Fei Wang, Wolfgang Reinhardt 0002 |
Extending Geographic Data Modeling by Adopting Constraint Decision Table to Specify Spatial Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AGILE Conf. ![In: The European Information Society: Leading the Way with Geo-information, Proceedings of the 10th AGILE Conference, Aalborg, Denmark, 8-11 May 2007, pp. 435-454, 2007, Springer, 978-3-540-72384-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Geographic data modeling, spatial integrity constraints, fielddata capture, data quality, Mobile GIS |
25 | Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig |
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, SOSP 2007, Stevenson, Washington, USA, October 14-17, 2007, pp. 335-350, 2007, ACM, 978-1-59593-591-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
code attestation, memory virtualization, hypervisor, code injection attacks, preventing, code integrity |
25 | Tsukasa Kudou, Nobuhiro Kataoka, Tadanori Mizuno |
Integrity Maintenance System of Database Query Under Updating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 491-498, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
integrity, relational database, query, temporal database, mission-critical system |
25 | Frederic Montagut, Refik Molva |
Traceability and Integrity of Execution in Distributed Workflow Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 251-266, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Integrity of execution, Decentralized workflows, Traceability |
25 | Alberto Bartoli, Eric Medvet |
Automatic Integrity Checks for Remote Web Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(6), pp. 56-62, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Web site defacement, GIS, integrity |
25 | Robert L. Glass |
Of Health, Trust, Money ... and Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 23(1), pp. 119-120, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
software engineering, integrity, software cost estimation |
25 | Danny Dhillon, Jerry Zhu, John Richards, Tejinder S. Randhawa |
Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 45-50, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multipoint relay (MPR), optimized link state routing (OLSR), routing protocol integrity, security, mobile ad-hoc networks (MANET), IP, intrusion detection systems (IDS) |
25 | Jun Chen 0008, Lei He 0001 |
Noise driven in-package decoupling capacitor optimization for power integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPD ![In: Proceedings of the 2006 International Symposium on Physical Design, ISPD 2006, San Jose, California, USA, April 9-12, 2006, pp. 94-101, 2006, ACM, 1-59593-299-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IC package, modeling, integrity, noise, power, resonance, decoupling capacitor, power distribution system |
25 | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi |
Trusted-link: web-link enhancement for integrity and trustworthiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 17-24, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
integrity, web, signature, link, trustworthiness |
25 | William Bereza, Yuming Tao, Shoujun Wang, Tad A. Kwasniewski, Rakesh H. Patel |
PELE: pre-emphasis & equalization link estimator to address the effects of signal integrity limitations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 43rd Design Automation Conference, DAC 2006, San Francisco, CA, USA, July 24-28, 2006, pp. 1013-1016, 2006, ACM, 1-59593-381-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
analysis and optimization, simulation beyond the die, layout, signal integrity |
25 | Ahsan Habib 0001, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang |
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 17(7), pp. 1010-1014, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
message digest and media streaming, Data integrity |
Displaying result #201 - #300 of 9246 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|