|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Qingfeng Chen, Chengqi Zhang, Shichao Zhang 0001 |
ENDL: A Logical Framework for Verifying Secure Transaction Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 7(1), pp. 84-109, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Secure transaction protocol, Security, Verification, Integrity, Electronic commerce, Confidentiality |
15 | Pedro Cano, Eloi Batlle, Ton Kalker, Jaap Haitsma |
A Review of Audio Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 41(3), pp. 271-284, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
content-based audio identification, audio information retrieval, watermarking, integrity verification, audio fingerprinting, robust hashing |
15 | Daniele Rossi 0001, André K. Nieuwland, Atul Katoch, Cecilia Metra |
New ECC for Crosstalk Impact Minimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Des. Test Comput. ![In: IEEE Des. Test Comput. 22(4), pp. 340-348, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Fault Tolerance, Reliability, Error Correcting Codes, Crosstalk, Signal Integrity |
15 | Reagan W. Moore, Richard Marciano |
Building preservation environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2005, Denver, CO, USA, June 7-11, 2005, Proceedings, pp. 424, 2005, ACM, 1-58113-876-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
infrastructure independence, persistent archives, authenticity, integrity |
15 | Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia |
Indexing Information for Data Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 206-221, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
data forensics, data marking, combinatorial group testing, data structures, data integrity, information hiding, tamper detection |
15 | Cristiano Forzan, Davide Pandini |
A complete methodology for an accurate static noise analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 15th ACM Great Lakes Symposium on VLSI 2005, Chicago, Illinois, USA, April 17-19, 2005, pp. 302-307, 2005, ACM, 1-59593-057-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
noise propagation, crosstalk, signal integrity |
15 | Junhu Wang |
A Comparative Study of Functional Dependencies for XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29 - April 1, 2005, Proceedings, pp. 308-319, 2005, Springer, 3-540-25207-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
XML tree, scheme file, Data integrity, functional dependency |
15 | Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka |
PIATS: A Partially Sanitizable Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 72-83, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Sanitizable signature scheme, partial integrity, privacy |
15 | Li Xiao 0001, Xiaodong Zhang 0001, Artur Andrzejak 0001, Songqing Chen |
Building a Large and Efficient Hybrid Peer-to-Peer Internet Caching System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 16(6), pp. 754-769, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
browser caching, communication anonymity, data integrity, peer-to-peer systems, proxy caching, Internet systems |
15 | Xiaocheng Ge, Fiona Polack, Régine Laleau |
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 16th International Conference, CAiSE 2004, Riga, Latvia, June 7-11, 2004, Proceedings, pp. 234-247, 2004, Springer, 3-540-22151-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control, Databases, data integrity, security models, development methods |
15 | Yingjiu Li, Huiping Guo, Sushil Jajodia |
Tamper detection and localization for categorical data using fragile watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004, pp. 73-82, 2004, ACM, 1-58113-969-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
integrity, database security, fragile watermarking |
15 | Peter Buneman, Wenfei Fan, Scott Weinstein |
Interaction between path and type constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Log. ![In: ACM Trans. Comput. Log. 4(4), pp. 530-577, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
types, integrity constraints, semistructured data, implication |
15 | Ira Acharya, Hemendra Kumar Singh |
Testing of 3G 1xEV-DV Stack - A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TestCom ![In: Testing of Communicating Systems, 15th IFIP International Conference, TestCom 2003, Sophia Antipolis, France, May 26-28, 2003, Proceedings, pp. 20-32, 2003, Springer, 3-540-40123-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
testing challenges, IUT, 1xEV-DV, EV-DV, DV, reference implementation, 3GPP2, LAC, RLP, L2, L3, packet data channel, PDCHCF, Message Integrity, simulation, Testing, MAC, queues, behavior, task, video conferencing, SDL, formalism, 3G, Signaling, logging, conformance, test automation, formal description techniques, MSC, timers, protocol stack, test scripts, TTCN |
15 | Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao |
A flexible and scalable authentication scheme for JPEG2000 image codestreams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the Eleventh ACM International Conference on Multimedia, Berkeley, CA, USA, November 2-8, 2003, pp. 433-441, 2003, ACM, 1-58113-722-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
message digest, authentication, data integrity, digital signature, image compression, JPEG2000, one-way hash function, merkle hash tree |
15 | Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari |
An infrastructure for managing secure update operations on XML data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 110-122, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
distributed updates, integrity check protocols, XML |
15 | Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers |
Secure program partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 20(3), pp. 283-328, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
mutual distrust, distributed systems, integrity, type systems, security policies, Confidentiality, secrecy, declassification, downgrading |
15 | Martin S. Olivier |
Database Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 4(2), pp. 20-27, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
dataveillance, integrity, availability, confidentiality, personal data, database privacy |
15 | Michael P. Evans, Steven Furnell |
A web-based resource migration protocol using WebDAV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Eleventh International World Wide Web Conference, WWW 2002, May 7-11, 2002, Honolulu, Hawaii, USA, pp. 263-271, 2002, ACM, 1-58113-449-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
link rot, resource locator service, resource migration protocol, web, WebDAV, referential integrity |
15 | Naren Kodali, Duminda Wijesekera |
Regulating access to SMIL formatted pay-per-view movies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, pp. 53-60, 2002, ACM, 1-58113-632-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
synchronized multimedia, XML, access control, integrity, encryption, smart card, SMIL, pay-per-view |
15 | April Kwong, Michael Gertz 0001 |
Authentic Publication of XML Document Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE (1) ![In: Proceedings of the 2nd International Conference on Web Information Systems Engineering, WISE'01, Organized by WISE Society and Kyoto University, Kyoto, Japan, 3-6 December 2001, Volume 1 (Main program), pp. 331-340, 2001, IEEE Computer Society, 0-7695-1393-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
authentic data publication, XML, data integrity |
15 | Andrew C. Myers, Barbara Liskov |
Protecting privacy using the decentralized label model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 9(4), pp. 410-442, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
principals, integrity, policies, lattice, confidentiality, roles, type checking, information flow controls, declassification, end-to-end, downgrading |
15 | Rolly Intan, Masao Mukaidono |
Fuzzy Functional Dependency and Its Application to Approximate Data Querying. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: 2000 International Database Engineering and Applications Symposium, IDEAS 2000, September 18-20, 2000, Yokohoma, Japan, Proccedings, pp. 47-54, 2000, IEEE Computer Society, 0-7695-0789-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
partial fuzzy functional dependency, approximate data querying, approximate data reduction, fuzzy integrity constraints, fuzzy query relations, extended query system, relational databases, projection, fuzzy set theory, conditional probability, approximate joins |
15 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
15 | Ann Q. Gates, Patricia J. Teller |
DynaMICs: An Automated and Independent Software-FaultDetection Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 17-19 November 1999, Washington, D.C, USA, Proceedings, pp. 11-19, 1999, IEEE Computer Society, 0-7695-0418-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
software-fault detection, software-fault monitoring, hardware-assisted monitoring, constraints, tracing, integrity constraints, verification and validation |
15 | Bert O. de Brock |
Declarative Specifications of Complex Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMLDO - Selected Papers ![In: Transactions and Database Dynamics, Eight International Workshop on Foundations of Models and Languages for Data and Objects, Schloß Dagstuhl, Germany, September 27-30, 1999, Selected Papers, pp. 150-166, 1999, Springer, 3-540-67201-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
transaction design, database dynamics, declarative specifications of database behavior, (static and dynamic) integrity constraints, (allowable versus available) transitions, cascading deletes, adaptations, semantics, Transactions, transaction models |
15 | Antonio Corradi, Rebecca Montanari, Cesare Stefanelli |
Mobile Agents Protection in the Internet Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 23rd International Computer Software and Applications Conference (COMPSAC '99), 27-19 October 1999, Phoenix, AZ, USA, pp. 80-85, 1999, IEEE Computer Society, 0-7695-0368-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Multiple-Hops protocol, Security, Internet, Mobile Agents, Integrity |
15 | William Currie Colket |
Code analysis of saftey-critical and real-time software using ASIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings ACM SIGAda Annual International Conference, SIGAda 1999, The Engineering of Industrial Strength Real-Time Software & Distributed Systems: Using Ada and Related Technologie, Redondo Beach, CA, USA, October 17-21, 1999., pp. 67-76, 1999, ACM, 1-58113-127-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
real-time, tasking, safety-critical, code analysis, ASIS, high integrity, Ada language, Ravenscar profile |
15 | Antonio Corradi, Rebecca Montanari, Cesare Stefanelli |
Security Issues in Mobile Agent Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 7th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '99), 20-22 December 1999, Cape Town, South Africa, Proceedings, pp. 3-8, 1999, IEEE Computer Society, 0-7695-0468-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Security, Internet, E-commerce, Mobile Agents, Integrity |
15 | Elisa Bertino, Giovanna Guerrini |
Extending the ODMG Object Model with Composite Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 1998 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages & Applications, OOPSLA 1998, Vancouver, British Columbia, Canada, October 18-22, 1998., pp. 259-270, 1998, ACM, 1-58113-005-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
ObjectStore, data models, integrity constraints, object-oriented database systems, composite objects |
15 | Xubo Zhang, Z. Meral Özsoyoglu |
Implication and Referential Constraints: A New Formal Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 9(6), pp. 894-910, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Semantic integrity constraints, implication constraints, referential constraints, database system, query containment, semantic query optimization, refutation |
15 | Peter Lindsey, Yaowei Liu, Owen Traynor |
A Generic Model for Fine Grained Configuration Management Including Version Control and Traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Software Engineering Conference ![In: 1997 Australian Software Engineering Conference (ASWEC '97), 28 September - 2 October 1997, Sydney, Australia, pp. 27-, 1997, IEEE Computer Society, 0-8186-8081-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
fine grained configuration management, trusted support, high-integrity software development, formal specification, consistency, requirements, object-oriented database, completeness, traceability, configuration management, version control, prototype system, design documents |
15 | Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein |
Surviving information warfare attacks on databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 164-174, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency |
15 | Ian T. Foster, Nicholas T. Karonis, Carl Kesselman, Greg Koenig, Steven Tuecke |
A Secure Communications Infrastructure for High-Performance Distributed Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 6th International Symposium on High Performance Distributed Computing, HPDC '97, Portland, OR, USA, August 5-8, 1997., pp. 125-136, 1997, IEEE Computer Society, 0-8186-8117-9. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
security-enhanced version, Nexus communication library, security/performance tradeoffs, authenticating, distributed computing, integrity, confidentiality, high-performance, security of data, users, resources, secure communications, security mechanisms |
15 | Christoph L. Schuba, Eugene H. Spafford |
A Reference Model for Firewall Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 133-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
firewall technology, technological aspect, specialized engineering solution, firewall systems, integrity assurance, centralized security policy, authentication, access control, audit, reference model, computer network management, networking technologies, communications security |
15 | Jane Grimson, Eoghan Felton, Gaye Stephens, William Grimson, Damon Berry |
Interoperability issues in sharing electronic healthcare records-the Synapses approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 3rd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '97), 8-12 September 1997, Lake Como, Italy, pp. 180-185, 1997, IEEE Computer Society, 0-8186-8126-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
interoperability issues, electronic healthcare records sharing, Synapses approach, pan-European project, federated database systems, distributed object-oriented environment, clinical integrity, web, standards, open systems, data warehousing, messaging, gateways |
15 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens |
Security services and public key infrastructure for ATM networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 22nd IEEE Conference on Local Computer Networks (LCN '97), 2-5 November 1997, Minneapolis, Minnesota, USA, Proceedings, pp. 253-262, 1997, IEEE Computer Society, 0-8186-8141-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services |
15 | Desmond Kirkpatrick, Alberto L. Sangiovanni-Vincentelli |
Digital sensitivity: predicting signal interaction using functional analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the 1996 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 1996, San Jose, CA, USA, November 10-14, 1996, pp. 536-541, 1996, IEEE Computer Society / ACM, 0-8186-7597-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
layout synthesis, Crosstalk, sensitivity, signal integrity |
15 | Cornelia Boldyreff, Julian Newman, Jorma Taramaa |
Managing process improvement in virtual software corporations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 5th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings, pp. 142-147, 1996, IEEE Computer Society, 0-8186-7445-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
virtual software corporations, process improvement management, software development organisation process, competitive demands, large multi-site multi-organization virtual software corporations, virtual software configuration, process measurement data collection, geographically distributed projects, exception condition handling, generic process model, process quality standards, software engineering, reliability, integrity, software process improvement, software development process, software process modelling, software development management |
15 | Mark W. Maier |
Developments in System Architecting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 21-25 October 1996, Montreal, Canada, pp. 139-142, 1996, IEEE Computer Society, 0-8186-7614-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Systems Architecting, multi-disciplinary system development, naval architecting, civil architecting, research needs, education programs, data integrity, systems analysis, system development |
15 | Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell |
Key distribution without individual trusted authentification servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 30-, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
key distribution systems, authentication servers, key distribution protocols, cross checksum scheme, cryptography, trust, protocols, data integrity, message authentication, symmetric encryption |
15 | Philip M. Johnson, Carleton A. Moore |
Investigating strong collaboration with the Annotated Egret Navigator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 4th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'95), April 20-22, 1995, Berkeley Springs, West Virginia, USA, Proceedings, pp. 180-188, 1995, IEEE Computer Society, 0-8186-7019-3. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
strong collaboration, Annotated Egret Navigator, structured hypertext document, graduate seminar, indirect authoring mechanisms, direct authoring mechanisms, context-sensitive change information, intermediate work products, groupware, hypermedia, database integrity, agent-based architecture |
15 | Michelle M. Hugue, Richard C. Scalzo |
Specifying fault tolerance in large complex computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), November 6-10, 1995, Fort Lauderdale, Florida, USA, pp. 369-372, 1995, IEEE Computer Society, 0-8186-7123-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
fault tolerance specification, large complex computing systems, requirements specification phase, fault hypothesis, partially correct system, system fault hypothesis, health management function, performance, real-time systems, reliability, formal specification, integrity, fault tolerant computing, software reliability, availability, safety, confidentiality, software performance evaluation, maintainability, timeliness, quality of service requirements, system behaviors, system life-cycle, dependability constraints |
15 | Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
A Logic for Reasoning About Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 10(3), pp. 226-264, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
composition knowledge, security, integrity, policy, time, logic, secrecy, permission, obligation, possible-worlds |
15 | Filippo Cacace, Stefano Ceri, Letizia Tanca, Stefano Crespi-Reghizzi |
Designing and Prototyping Data-Intensive Applications in the Logres and Algres Programming Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 18(6), pp. 534-546, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Logres, Algres, persistent data, declarative requirements, imperative code, formal specification, prototyping, programming environment, programming environments, rapid prototyping, relational algebra, integrity constraints, software prototyping, human errors, data-intensive applications, application specifications, object-oriented data modeling, rule-based programming, database language |
15 | John Mylopoulos, Alexander Borgida, Matthias Jarke, Manolis Koubarakis |
Telos: Representing Knowledge About Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 8(4), pp. 325-362, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
belief time, history time, knowledge base, integrity constraints, class, metaclass, instance, Telos, temporal knowledge, proposition, deductive rules |
15 | Victor M. Markowitz, Johann A. Makowsky |
Identifying Extended Entity-Relationship Object Structures in Relational Schemas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(8), pp. 777-790, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
extended entity-relationship object structures, relation-schemes, key dependencies, key-based inclusion dependencies, referential integrity constraints, EER schema, EER-convertible, EER object structures, normalization procedure, relational database schemas, object-oriented database schemas, semantics, object-oriented programming, relational databases, database management systems, database theory, normal form, relational schemas |
15 | Che-Fn Yu, Virgil D. Gligor |
A Specification and Verification Method for Preventing Denial of Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(6), pp. 581-592, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
failure absence, integrity violations, user agreements, simultaneity conditions, denial-of-service prevention, formal specification, concurrent programs, security of data, specification method, verification method |
15 | Bipin C. Desai |
Performance of a Composite Attribute and Join Index. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 15(2), pp. 142-152, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
attribute index, composite index, B/sub c/-tree, B/sup +/-tree, common data values, structural integrity constraints, database, data structures, relational databases, tuples, join index |
15 | Joobin Choobineh, Michael V. Mannino, Jay F. Nunamaker Jr., Benn R. Konsynski |
An Expert Database Design System Based on Analysis of Forms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 14(2), pp. 242-253, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
expert database design system, form model, form selection, entity identification, attribute attachment, relationship identification, cardinality identification, form flow, designer dialog, expert systems, expert systems, database management systems, integrity constraints, conceptual schema |
15 | Tzonelih Hwang, T. R. N. Rao |
Secret Error-Correcting Codes (SECC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 540-563, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity |
15 | Sushil V. Pillai, Ramanatham Gudipati, Leszek Lilien |
Design issues and an architecture for a heterogenous multidatabase system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the 15th ACM Annual Conference on Computer Science, St. Louis, Missouri, USA, February 16-19, 1987, pp. 74-79, 1987, ACM, 0-89791-218-7. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
distributed systems, reliability, database management systems, heterogeneity, semantic integrity |
15 | Michael Stonebraker, Eugene Wong 0001, Peter Kreps, Gerald Held |
The Design and Implementation of INGRES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 1(3), pp. 189-222, 1976. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
data sublanguage, query decompositon, concurrency, relational database, data integrity, query language, protection, data organization, nonprocedural language, database optimization |
15 | Peter P. Chen |
The Entity-Relationship Model - Toward a Unified View of Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 1(1), pp. 9-36, 1976. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
Data Base Task Group, data definition and manipulation, data integrity and consistency, entity set model, logigcal view of data, semantics of data, data models, database design, relational model, network model, entity-relationship model |
15 | Naftaly H. Minsky |
On Interaction with Data Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Workshop, Vol. 1 ![In: Proceedings of 1974 ACM-SIGMOD Workshop on Data Description, Access and Control, Ann Arbor, Michigan, USA, May 1-3, 1974, 2 Volumes, pp. 51-62, 1974, ACM, 978-1-4503-7415-6. The full citation details ...](Pics/full.jpeg) |
1974 |
DBLP DOI BibTeX RDF |
Sub-schema, Privacy, Integrity, Abstraction, Data base |
14 | Flavio Lombardi, Roberto Di Pietro |
Transparent security for cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 414-415, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
threat handling, security, cloud computing, virtual machine monitor |
14 | Jin Taek Kim, Jeong-Ho Kho, Min-Seok Hong, Choul Woong Son, Do-Won Lee, Sang-Jo Youk, Geuk Lee |
A study on intrusion protection techniques against Linux kernel backdoor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 86-90, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 48-67, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
14 | Alodeep Sanyal, Abhisek Pan, Sandip Kundu |
A study on impact of loading effect on capacitive crosstalk noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 10th International Symposium on Quality of Electronic Design (ISQED 2009), 16-18 March 2009, San Jose, CA, USA, pp. 696-701, 2009, IEEE Computer Society, 978-1-4244-2952-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Qian Wang 0002, Cong Wang 0001, Jin Li 0002, Kui Ren 0001, Wenjing Lou |
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 355-370, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(4), pp. 469-491, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Message authentication, Authenticated encryption, Symmetric encryption, Concrete security |
14 | Ashish Kundu, Elisa Bertino |
A New Model for Secure Dissemination of XML Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part C ![In: IEEE Trans. Syst. Man Cybern. Part C 38(3), pp. 292-301, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Zemao Chen, Xiaoping Wu, Weimin Tang |
An Executable Code Authorization Model for Secure Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 292-295, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf |
Public key based authentication for secure integration of sensor data and RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HeterSanet ![In: Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, HeterSanet 2008, Hong Kong, SAR, China, May 30, 2008, pp. 61-66, 2008, ACM, 978-1-60558-113-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, workflow, RFID, sensor, tag, certificate, public key |
14 | Mikhail J. Atallah, YounSun Cho, Ashish Kundu |
Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 696-704, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Lingli Deng, Yeping He, Ziyao Xu |
Service Authenticity in P2P File-Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2246-2253, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell |
Cloaker: Hardware Supported Rootkit Concealment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 296-310, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, operating system, rootkit, ARM |
14 | Bassem Elkarablieh, Sarfraz Khurshid |
Juzi: a tool for repairing complex data structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, pp. 855-858, 2008, ACM, 978-1-60558-079-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
systematic search, symbolic execution, assertions, error recovery, data structure repair |
14 | Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Göschka |
Availability and Performance of the Adaptive Voting Replication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 53-60, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Frank Y. W. Law, Kam-Pui Chow, Michael Y. K. Kwan, Pierre K. Y. Lai |
Consistency Issue on Live Systems Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 136-140, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Rod Chapman |
Correctness by construction: putting engineering (back) into software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings of the 2007 Annual ACM SIGAda International Conference on Ada, Fairfax, Virginia, USA, November 4-8, 2007, pp. 100, 2007, ACM, 978-1-59593-876-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Ravi Sahita, Uday R. Savagaonkar, Prashant Dewan, David Durham |
Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Managing Virtualization of Networks and Services, 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007, Proceedings, pp. 135-146, 2007, Springer, 978-3-540-75693-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Network Access Framework, Lying Endpoint, Virtualization, Memory Protections |
14 | Brian King, Xiaolan Joy Zhang |
Securing the Pharmaceutical Supply Chain using RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 23-28, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pharmaceutical supply chain, security, privacy, RFID |
14 | Meng Yu 0001, Wanyu Zang, Barbara Reagor |
Decentralized Trust Management based on the Reputation of Information Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2007, London, UK, 15-17 April 2007, pp. 212-217, 2007, IEEE, 1-4244-1076-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Arati Baliga, Pandurang Kamat, Liviu Iftode |
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 246-251, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Mohamed Nabeel, Elisa Bertino |
A structure preserving approach for securing XML documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007, pp. 8-15, 2007, IEEE Computer Society / ICST, 1-4244-1317-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Meng Yu 0001, Wanyu Zang, Peng Liu 0005 |
Database Isolation and Filtering against Data Corruption Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 97-106, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Lorenz Froihofer, Karl M. Göschka, Johannes Osrael |
Middleware Support for Adaptive Dependability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware ![In: Middleware 2007, ACM/IFIP/USENIX 8th International Middleware Conference, Newport Beach, CA, USA, November 26-30, 2007, Proceedings, pp. 308-327, 2007, Springer, 978-3-540-76777-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
constraint consistency, adaptivity, Middleware, dependability, replication, inconsistency |
14 | Kiron Vijayasankar, Gopalan Sivathanu, Swaminathan Sundararaman, Erez Zadok |
Exploiting type-awareness in a self-recovering disk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, StorageSS 2007, Alexandria, VA, USA, October 29, 2007, pp. 25-30, 2007, ACM, 978-1-59593-891-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
type-awareness |
14 | Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong |
Minos: Architectural support for protecting control data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Archit. Code Optim. ![In: ACM Trans. Archit. Code Optim. 3(4), pp. 359-389, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Control data, worms, buffer overflow |
14 | Weidong Shi, Hsien-Hsin S. Lee |
Authentication Control Point and Its Implications For Secure Processor Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-39 2006), 9-13 December 2006, Orlando, Florida, USA, pp. 103-112, 2006, IEEE Computer Society, 0-7695-2732-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jordi Cabot, Ernest Teniente |
Incremental Evaluation of OCL Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 18th International Conference, CAiSE 2006, Luxembourg, Luxembourg, June 5-9, 2006, Proceedings, pp. 81-95, 2006, Springer, 3-540-34652-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Boriana Vassileva, Boris Vassilev |
SBAS Vertical Protection Level Assessment in the Case of Error Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
John Vincent Atanasoff Symposium ![In: 2006 IEEE John Vincent Atanasoff International Symposium on Modern Computing (JVA2006), 3-6 October 2006, Sofia, Bulgaria, pp. 137-142, 2006, IEEE Computer Society, 0-7695-2643-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Mohammad Ashiqur Rahaman, Andreas Schaad, Maarten Rits |
Towards secure SOAP message exchange in a SOA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 77-84, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XML rewriting attack, sOAP account, SOA |
14 | Paolo Falcarin, Riccardo Scandariato, Mario Baldi |
Remote Trust with Aspect-Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 451-458, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jedidiah R. Crandall, Frederic T. Chong |
A security assessment of the minos architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 48-57, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Wei Zhang 0002 |
Replication Cache: A Small Fully Associative Cache to Improve Data Cache Reliability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 54(12), pp. 1547-1555, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
write-back cache, in-cache replication, Soft error |
14 | Brendan Hall, Kevin Driscoll 0001, Michael Paulitsch, Samar Dajani-Brown |
Ringing out Fault Tolerance. A New Ring Network for Superior Low-Cost Dependability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, pp. 298-307, 2005, IEEE Computer Society, 0-7695-2282-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Lantian Zheng, Andrew C. Myers |
End-to-End Availability Policies and Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France, pp. 272-286, 2005, IEEE Computer Society, 0-7695-2340-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Michael Benedikt |
An Insider's Guide to Logic in Telecommunications Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: 20th IEEE Symposium on Logic in Computer Science (LICS 2005), 26-29 June 2005, Chicago, IL, USA, Proceedings, pp. 104-105, 2005, IEEE Computer Society, 0-7695-2266-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jordi Cabot, Ernest Teniente |
Computing the Relevant Instances That May Violate an OCL Constraint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 17th International Conference, CAiSE 2005, Porto, Portugal, June 13-17, 2005, Proceedings, pp. 48-62, 2005, Springer, 3-540-26095-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Fangyong Hou, Zhiying Wang 0003, Kui Dai, Yun Liu |
Protecting Mass Data Basing on Small Trusted Agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 362-373, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Atsushi Kurokawa, Masaharu Yamamoto, Nobuto Ono, Tetsuro Kage, Yasuaki Inoue, Hiroo Masuda |
Capacitance and Yield Evaluations Using a 90-nm Process Technology Based on the Dense Power-Ground Interconnect Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 6th International Symposium on Quality of Electronic Design (ISQED 2005), 21-23 March 2005, San Jose, CA, USA, pp. 153-158, 2005, IEEE Computer Society, 0-7695-2301-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Daesung Moon, Yongwha Chung, Kiyoung Moon, Sung Bum Pan |
Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAR ![In: Image Analysis and Recognition, Second International Conference, ICIAR 2005, Toronto, Canada, September 28-30, 2005, Proceedings, pp. 1106-1117, 2005, Springer, 3-540-29069-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Biometrics, Embedded Processors, Fingerprint Verification |
14 | Murat R. Becer, Ravi Vaidyanathan, Chanhee Oh, Rajendran Panda |
Crosstalk noise control in an SoC physical design flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(4), pp. 488-497, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Soon-Kyeong Kim, David A. Carrington |
A Formal Object-Oriented Approach to defining Consistency Constraints for UML Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Software Engineering Conference ![In: 15th Australian Software Engineering Conference (ASWEC 2004), 13-16 April 2004, Melbourne, Australia, pp. 87-95, 2004, IEEE Computer Society, 0-7695-2089-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Reiner Sailer, Trent Jaeger, Xiaolan Zhang 0001, Leendert van Doorn |
Attestation-based policy enforcement for remote access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 308-317, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trusted computing, security management, remote access |
14 | Dominic Osborne, Derek Abbott, Matthew Sorell, Derek Rogers |
Multiple embedding using robust watermarks for wireless medical images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUM ![In: Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia, MUM 2004, College Park, Maryland, USA, October 27-29, 2004, pp. 245-250, 2004, ACM, 1-58113-981-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, medical images, semi-fragile watermarking |
14 | Praveen Madiraju, Rajshekhar Sunderraman |
A mobile agent approach for global database constraint checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 679-683, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
multi-database systems, mobile agents, global constraints |
14 | Jedidiah R. Crandall, Frederic T. Chong |
Minos: Control Data Attack Prevention Orthogonal to Memory Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 37th Annual International Symposium on Microarchitecture (MICRO-37 2004), 4-8 December 2004, Portland, OR, USA, pp. 221-232, 2004, IEEE Computer Society, 0-7695-2126-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Andrew K. Wright, John A. Kinast, Joe McCarty |
Low-Latency Cryptographic Protection for SCADA Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 263-277, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
|
|