|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 10474 occurrences of 3799 keywords
|
|
|
Results
Found 18116 publication records. Showing 18116 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | William Formyduval |
Integrating static analysis and testing for firewall policies. |
OOPSLA Companion |
2009 |
DBLP DOI BibTeX RDF |
firewall policies, test generation, firewalls |
22 | Konstantinos Parisopoulos, Efthimios Tambouris, Konstantinos A. Tarabanis |
Transformational Government in Europe: A Survey of National Policies. |
WSKS (1) |
2009 |
DBLP DOI BibTeX RDF |
Transformational government, National policies, Value innovation, Efficiency, Public sector |
22 | Anne Benoit |
Comparison of Access Policies for Replica Placement in Tree Networks. |
Euro-Par |
2009 |
DBLP DOI BibTeX RDF |
access policies, hierarchical platforms, video-on-demand applications, heterogeneous platforms, replica placement |
22 | Silvestro Montrone, Massimo Bilancia, Paola Perchinunno, Carmelo Maria Torre |
Economic Evaluation and Statistical Methods for Detecting Hot Spots of Social and Housing Difficulties in Urban Policies. |
ICCSA (1) |
2009 |
DBLP DOI BibTeX RDF |
Housing, economic policies, scan statistics, fuzzy logic, hot spots |
22 | Nikhil Swamy, Michael Hicks 0001 |
Verified enforcement of stateful information release policies. |
ACM SIGPLAN Notices |
2008 |
DBLP DOI BibTeX RDF |
affine types, certified evaluation, state modifying policies, dependent types, declassification, singleton types |
22 | Julio Cesar Royer, Roberto Willrich, Michel Diaz |
User Profile-Based Authorization Policies for Network QoS Services. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
QoS, Policies, User Profile |
22 | Marcella Atzori, Francesco Aymerich, Gianni Fenu, Simone Surcis |
Analysis of Internet Policies and Civil Rights In Italy, Serbia and Burma-Myanmar: A Technological and Legal Approach. |
ICDS |
2008 |
DBLP DOI BibTeX RDF |
ISPs Policies, Civil Rights, Filtering System, ICT |
22 | Clara Bertolissi, Maribel Fernández |
A rewriting framework for the composition of access control policies. |
PPDP |
2008 |
DBLP DOI BibTeX RDF |
distributed systems, access control, security policies, term rewriting |
22 | Anca I. D. Bucur, Dick H. J. Epema |
Scheduling Policies for Processor Coallocation in Multicluster Systems. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Multicluster systems, coallocation, simulation, scheduling policies |
22 | Joachim Biskup, Torben Weibert |
Confidentiality Policies for Controlled Query Evaluation. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
confidentiality policies, Inference control, logic databases |
22 | Simone Ferraresi, Emanuele Francocci, Alessio Quaglini, Francesco Picasso |
Security Policies Tuning Among IP Devices. |
KES (2) |
2007 |
DBLP DOI BibTeX RDF |
Policies, IP, Rules, Conflicts, Packet Filtering |
22 | Sanjeev Swami, Pankaj J. Khairnar |
Optimal normative policies for marketing of products with limited availability. |
Ann. Oper. Res. |
2006 |
DBLP DOI BibTeX RDF |
Product diffusion models, Marketing policies, Optimal control |
22 | Gido A. J. F. Brouns, Jan van der Wal |
Optimal threshold policies in a two-class preemptive priority queue with admission and termination control. |
Queueing Syst. Theory Appl. |
2006 |
DBLP DOI BibTeX RDF |
Admission and termination control, Optimal threshold policies, Markov decision processes, Priority queues |
22 | Nikos Houssos, Nancy Alonistioti, Lazaros F. Merakos |
Specification and Dynamic Introduction of 3rd Party, Service-Specific Adaptation Policies for Mobile Applications. |
Mob. Networks Appl. |
2005 |
DBLP DOI BibTeX RDF |
mobile systems beyond 3G, adaptation, policies, reconfigurability, mobile services |
22 | Shalabh Bhatnagar, I. Bala Bhaskar Reddy |
Optimal Threshold Policies for Admission Control in Communication Networks via Discrete Parameter Stochastic Approximation. |
Telecommun. Syst. |
2005 |
DBLP DOI BibTeX RDF |
regularized semi-Markov modulated Poisson process, two timescale stochastic approximation, simultaneous perturbation stochastic approximation, threshold type policies, admission control, communication networks |
22 | Salvador Petit, Julio Sahuquillo, Jose M. Such, David R. Kaeli |
Exploiting temporal locality in drowsy cache policies. |
Conf. Computing Frontiers |
2005 |
DBLP DOI BibTeX RDF |
drowsy cache policies, reuse information, low-power, temporal locality, set-associative caches |
22 | Giacomo Cabri, Luca Ferrari 0002, Letizia Leonardi |
Embedding JAAS in agent roles to apply local security policies. |
PPPJ |
2004 |
DBLP DOI BibTeX RDF |
Java agents, local policies, authentication, roles |
22 | Anna Satsiou, Michael Paterakis |
Impact of Frequency-Based Cache Management Policies on the Performance of Segment Based Video Caching Proxies. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
Video Proxy Caching, Segment-Based Video Caching, Frequency Based Cache Management Policies, Multimedia Streaming |
22 | Christian Bizer, Radoslaw Oldakowski |
Using context- and content-based trust policies on the semantic web. |
WWW (Alternate Track Papers & Posters) |
2004 |
DBLP DOI BibTeX RDF |
named graphs, trust mechanisms, trust policies, semantic web |
22 | Spyros A. Reveliotis, Jin Young Choi 0001 |
On the Optimality of Randomized Deadlock Avoidance Policies. |
Discret. Event Dyn. Syst. |
2003 |
DBLP DOI BibTeX RDF |
sequential resource allocation systems, controlled Markov chains, randomized control policies, deadlock resolution |
22 | Alexander Kesselman, Adi Rosén |
Scheduling policies for CIOQ switches. |
SPAA |
2003 |
DBLP DOI BibTeX RDF |
CIOQ switches, competitive analysis, buffer management, scheduling policies |
22 | Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini |
X-TNL: An XML-based Language for Trust Negotiations. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
disclosure policies, XML, trust negotiation, digital credentials |
22 | William Kulju, Hanan Lutfiyya |
Design and Implementation of an Application Layer Protocol for Reducing UDP Traffic Based on User Hints and Policies. |
MMNS |
2002 |
DBLP DOI BibTeX RDF |
User hints, management, Policies, UDP |
22 | Carla Alessandra Lima Reis, Rodrigo Quites Reis, Heribert Schlebbe, Daltro José Nunes |
Resource Instantiation Policies for Software Process Environments. |
COMPSAC |
2002 |
DBLP DOI BibTeX RDF |
Software process instantiation, Instantiation Policies, Resource Instantiation, Process-Centered Software Engineering Environments |
22 | Samir Tata, Claude Godart, Uffe Kock Wiil |
Policies for cooperative hypermedia systems: concepts and prototype implementation. |
Hypertext |
2002 |
DBLP DOI BibTeX RDF |
cooperation policies, cooperative hypermedia framework |
22 | Arnaud Legout, Jörg Nonnenmacher, Ernst W. Biersack |
Bandwidth-allocation policies for unicast and multicast flows. |
IEEE/ACM Trans. Netw. |
2001 |
DBLP DOI BibTeX RDF |
Bandwidth-allocation policies, multicast, unicast |
22 | Shalabh Bhatnagar, Michael C. Fu 0001, Steven I. Marcus, Pedram Jaefari Fard |
Optimal structured feedback policies for ABR flow control using two-timescale SPSA. |
IEEE/ACM Trans. Netw. |
2001 |
DBLP DOI BibTeX RDF |
Network of nodes, optimal structured feedback policies, rate-based ABR flow control, single bottleneck node, two-timescale SPSA |
22 | Elisa Bertino, Silvana Castano, Elena Ferrari |
On specifying security policies for web documents with an XML-based language. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
subject credentials, XML, XML, access control, security policies |
22 | Hanan Lutfiyya, Gary Molenkamp, Michael Katchabaw, Michael A. Bauer 0001 |
Issues in Managing Soft QoS Requirements in Distributed Systems Using a Policy-Based Framework. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
Distributed Systems, Policies, QoS Requirements |
22 | Andrea Bobbio, Antonio Puliafito, Miklós Telek |
A Modeling Framework to Implement Preemption Policies in Non-Markovian SPNs. |
IEEE Trans. Software Eng. |
2000 |
DBLP DOI BibTeX RDF |
preemptive policies, transient and steady-state analysis, Stochastic Petri Nets, Markov regenerative processes |
22 | Wael Hosny Fouad Aly, Hanan Lutfiyya |
Dynamic Adaptation of Policies in Data Center Management. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Zhen Liu 0001, Anand Ranganathan, Anton Riabov |
Specifying and Enforcing High-Level Semantic Obligation Policies. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Nima Kaviani, Dragan Gasevic, Marek Hatala, Gerd Wagner 0001 |
Web Rule Languages to Carry Policies. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Tatyana Ryutov |
A Socio-cognitive Approach to Modeling Policies in Open Environments. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Moritz Y. Becker, Peter Sewell |
Cassandra: Distributed Access Control Policies with Tunable Expressiveness. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Peter F. Linington, Stephen W. Neal |
Using Policies in the Checking of Business to Business Contracts. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Vijay G. Bharadwaj, John S. Baras |
Towards Automated Negotiation of Access Control Policies. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Tatyana Ryutov, B. Clifford Neuman |
The Specification and Enforcement of Advanced Security Policies. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Brian Shand, Jean Bacon |
Policies in Accountable Contracts. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Jan Chomicki, Jorge Lobo 0001 |
Monitors for History-Based Policies. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Niklas Broberg, David Sands 0001 |
Paralocks: role-based information flow control and beyond. |
POPL |
2010 |
DBLP DOI BibTeX RDF |
information flow, security policies, language based security |
22 | Ali Dada, Frédéric Thiesse |
Sensor Applications in the Supply Chain: The Example of Quality-Based Issuing of Perishables. |
IOT |
2008 |
DBLP DOI BibTeX RDF |
cool chain, issuing policies, retail industry, RFID, sensors, supply chain management, inventory management |
22 | Mpostol Jeremia Mashinini |
Challenges of ICT policy for rural communities: A case study from South Africa. |
HCC |
2008 |
DBLP DOI BibTeX RDF |
Traditional leadership, grounded theory method, ICT Policies, South Africa, rural communities |
22 | Francisco Javier González-Cañete, Eduardo Casilari, Alicia Triviño-Cabrera |
A windows based web cache simulator tool. |
SimuTools |
2008 |
DBLP DOI BibTeX RDF |
IRCache, simulator, web cache, replacement policies |
22 | Dongxi Liu, Surya Nepal, David Moreland, Shiping Chen 0001, Chen Wang 0008, John Zic |
Secure and Conditional Resource Coordination for Successful Collaborations. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
Secure Resource Model, Robust Collaboration, Resource Coordination, Access Policies |
22 | José Niño-Mora |
Characterization and computation of restless bandit marginal productivity indices. |
VALUETOOLS |
2007 |
DBLP DOI BibTeX RDF |
marginal productivity index, restless bandits, Markov decision processes, block algorithms, index policies |
22 | Aslan Askarov, Andrei Sabelfeld |
Localized delimited release: combining the what and where dimensions of information release. |
PLAS |
2007 |
DBLP DOI BibTeX RDF |
de-classification, information flow, security policies, noninterference, downgrading |
22 | Phil Greenwood, Lynne Blair |
A Framework for Policy Driven Auto-adaptive Systems Using Dynamic Framed Aspects. |
T. Aspect-Oriented Software Development |
2006 |
DBLP DOI BibTeX RDF |
parameterisation, policies, frames, dynamic adaptation, dynamic AOP, aspect interaction, auto-adaptive |
22 | R. Sekar 0001, V. N. Venkatakrishnan, Samik Basu 0001, Sandeep Bhatkar, Daniel C. DuVarney |
Model-carrying code: a practical approach for safe execution of untrusted applications. |
SOSP |
2003 |
DBLP DOI BibTeX RDF |
sand-boxing, security policies, policy enforcement, mobile code security |
22 | Bas van Aarle, Jacob Engwerda, Joseph Plasmans |
Monetary and Fiscal Policy Interaction in the EMU: A Dynamic Game Approach. |
Ann. Oper. Res. |
2002 |
DBLP DOI BibTeX RDF |
EMU, stabilisation policies, full and partial cooperation, LQ dynamic game |
22 | André van der Hoek, Antonio Carzaniga, Dennis Heimbigner, Alexander L. Wolf |
A Testbed for Configuration Management Policy Programming. |
IEEE Trans. Software Eng. |
2002 |
DBLP DOI BibTeX RDF |
configuration management policies, distributed configuration management, policy programming, peer-to-peer, configuration management, version control |
22 | Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman |
A Flexible Access Control Service for Java Mobile Code. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
flexible access control service, Java mobile code, remote servers, distributed heterogeneous clients, foreign code execution, host node protection, code protection, sandbox model, downloaded code, source location, inter-organisational environments, expressive languages, Ponder, Java security architecture, Java, Internet, specification languages, security policies, signature, distributed programming, Internet applications, authorisation, declarative language, technology diffusion, dynamic loading |
22 | Yun Bai 0001, Vijay Varadharajan |
On Formal Languages for Sequences of Authorization Transformations. |
SAFECOMP |
1999 |
DBLP DOI BibTeX RDF |
Policy Transformation, Formal language, Default logic, Authorization Policies |
22 | John P. Lehoczky |
Real-time queueing network theory. |
RTSS |
1997 |
DBLP DOI BibTeX RDF |
real-time queueing network theory, Jackson queueing networks, end-to-end deadlines, instantaneous multidimensional profiles, multivariate Brownian motion, deterministic profile, queue control policies, queueing theory, traffic intensity |
22 | Gerti Kappel, Stefan Rausch-Schott, Werner Retschitzegger, Markku Sakkinen |
From Rules To Rule Patterns. |
CAiSE |
1996 |
DBLP DOI BibTeX RDF |
rule patterns, specification of business policies, work-flow management |
22 | Ming Xiong, Rajendran M. Sivasankaran, John A. Stankovic, Krithi Ramamritham, Donald F. Towsley |
Scheduling transactions with temporal constraints: exploiting data semantics. |
RTSS |
1996 |
DBLP DOI BibTeX RDF |
data temporal consistency, data-deadline, time cognizant nonwaiting transaction scheduling, time cognizant forced wait policies, temporal data similarity, user transactions, scheduling, performance, delay, temporal constraints, real-time database, data semantics, simulation experiments, transaction scheduling, sensor data |
22 | Dinei A. F. Florêncio, Cormac Herley |
Where do security policies come from? |
SOUPS |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Maritza Johnson, John Karat, Clare-Marie Karat, Keith Grueneberg |
Optimizing a policy authoring framework for security and privacy policies. |
SOUPS |
2010 |
DBLP DOI BibTeX RDF |
security policy, privacy policy, user experience design, policy management, policy refinement, policy authoring |
22 | Ninghui Li, Qihua Wang, Mahesh V. Tripunitara |
Resiliency Policies in Access Control. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
fault-tolerant, Access control, policy design |
22 | Lawrence Henesey, Paul Davidsson, Jan A. Persson |
Agent based simulation architecture for evaluating operational policies in transshipping containers. |
Auton. Agents Multi Agent Syst. |
2009 |
DBLP DOI BibTeX RDF |
Container terminal management, Agent-based simulation, Policy evaluation |
22 | Sebastian Speiser |
Semantic Usage Policies for Web Services. |
ISWC |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Alexander Pretschner, Judith Rüesch, Christian Schaefer, Thomas Walter 0001 |
Formal Analyses of Usage Control Policies. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Bernhard Hollunder |
Domain-Specific Processing of Policies or: WS-Policy Intersection Revisited. |
ICWS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Ivan Markovic, Sukesh Jain, Mahmoud El-Gayyar, Armin B. Cremers, Nenad Stojanovic |
Modeling and Enforcement of Business Policies on Process Models with Maestro. |
ESWC |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Michele Barletta, Silvio Ranise, Luca Viganò 0001 |
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Peter Vamplew 0001, Richard Dazeley, Ewan Barker, Andrei V. Kelarev |
Constructing Stochastic Mixture Policies for Episodic Multiobjective Reinforcement Learning Tasks. |
Australasian Conference on Artificial Intelligence |
2009 |
DBLP DOI BibTeX RDF |
scalarisation, reinforcement learning, Pareto fronts, multiobjective |
22 | Tao Sun, Qianchuan Zhao, Peter B. Luh, Robert N. Tomastik |
Optimization of Joint Replacement Policies for Multipart Systems by a Rollout Framework. |
IEEE Trans Autom. Sci. Eng. |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Philippe Darondeau, Maciej Koutny, Marta Pietkiewicz-Koutny, Alexandre Yakovlev |
Synthesis of Nets with Step Firing Policies. |
Petri Nets |
2008 |
DBLP DOI BibTeX RDF |
step firing policy, step transition system, synthesis problem, Petri nets, regions |
22 | Natsuki Yamanobe, Hiromitsu Fujii, Tamio Arai, Ryuichi Ueda |
Motion generation for clutch assembly by integration of multiple existing policies. |
IROS |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Agustín C. Caminero, Anthony Sulistio, María Blanca Caminero, Carmen Carrión 0001, Rajkumar Buyya |
Simulation of Buffer Management Policies in Networks for Grids. |
Annual Simulation Symposium |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Ketan Savla, Tom Temple, Emilio Frazzoli |
Human-in-the-loop vehicle routing policies for dynamic environments. |
CDC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong |
Expandable grids for visualizing and authoring computer security policies. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
expandable grid, file permissions, security, visualization, privacy |
22 | Junpei Zushi, Gang Zeng, Hiroyuki Tomiyama, Hiroaki Takada, Koji Inoue |
Improved Policies for Drowsy Caches in Embedded Processors. |
DELTA |
2008 |
DBLP DOI BibTeX RDF |
Low Power Cache Design, Leakage Energy, Drowsy Cache |
22 | Shieu-Hong Lin |
Finding Optimal Refueling Policies in Transportation Networks. |
AAIM |
2008 |
DBLP DOI BibTeX RDF |
|
22 | JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu |
Systematic Structural Testing of Firewall Policies. |
SRDS |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Prathima Rao, Dan Lin 0001, Elisa Bertino, Ninghui Li, Jorge Lobo 0001 |
EXAM: An Environment for Access Control Policy Analysis and Management. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
XACML, Policy Analysis |
22 | Eric Horvitz, Tim Paek |
Complementary computing: policies for transferring callers from dialog systems to human receptionists. |
User Model. User Adapt. Interact. |
2007 |
DBLP DOI BibTeX RDF |
Probabilistic user modeling, Complementary computing, Machine learning, Spoken dialog systems, Human-machine systems |
22 | Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu |
CLID: A general approach to validate security policies in a dynamic network. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Kris Verlaenen, Bart De Win, Wouter Joosen |
Towards simplified specification of policies in different domains. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Christian Wolter, Andreas Schaad, Christoph Meinel |
Deriving XACML Policies from Business Process Models. |
WISE Workshops |
2007 |
DBLP DOI BibTeX RDF |
Policy Definition, Separation of Duties Business Process Modeling, eXtensible Access Control Markup Language, Integration, Enforcement |
22 | Anderson Santana de Oliveira, Eric Ke Wang, Claude Kirchner, Hélène Kirchner |
Weaving rewrite-based access control policies. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
strategic rewriting, access control, aspect-oriented programming, term rewriting, execution monitoring |
22 | Francesc Guim 0001, Julita Corbalán, Jesús Labarta |
Modeling the Impact of Resource Sharing in Backfilling Policies using the Alvio Simulator. |
MASCOTS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Juan Cespedes, Antonio Fernández 0001, José Luis López-Presa, M. Araceli Lorenzo, Pilar Manzano, Juan Martínez-Romo, Alberto Mozo, Anna Puig-Centelles, Agustín Santos, Christopher Thraves |
Performance of scheduling policies in adversarial networks with non synchronized clocks. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Tom Goovaerts, Bart De Win, Wouter Joosen |
A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. |
DAIS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Anand Tikotekar, Geoffroy Vallée, Thomas J. Naughton, Stephen L. Scott, Chokchai Leangsuksun |
Evaluation of fault-tolerant policies using simulation. |
CLUSTER |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Hiroshi Yamada, Kenji Kono |
FoxyTechnique: tricking operating system policies with a virtual machine monitor. |
VEE |
2007 |
DBLP DOI BibTeX RDF |
virtual machine, resource management, interference |
22 | Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Djamal Benslimane, Fenglin Liu |
On Checking the Compatibility of Web Services' Policies. |
PDCAT |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li |
An Automated Framework for Validating Firewall Policy Enforcement. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Guido Boella, Leendert W. N. van der Torre |
Security policies for sharing knowledge in virtual communities. |
IEEE Trans. Syst. Man Cybern. Part A |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan |
Vulnerability analysis For evaluating quality of protection of security policies. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
security, evaluation, metric, policy |
22 | Ninghui Li, Mahesh V. Tripunitara, Qihua Wang |
Resiliency policies in access control. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
fault-tolerant, access control, policy design |
22 | Omer Ozan Sonmez, Hashim H. Mohamed, Dick H. J. Epema |
Communication-Aware Job Placement Policies for the KOALA Grid Scheduler. |
e-Science |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Chun Ruan, Vijay Varadharajan |
Integration of Graph Based Authorization Policies. |
ISMIS |
2006 |
DBLP DOI BibTeX RDF |
authorization conflict, access control, weighted graph |
22 | Nathaniel Pettis, Jason Ridenour, Yung-Hsiang Lu |
Automatic run-time selection of power policies for operating systems. |
DATE |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Devrim Unal, M. Ufuk Çaglayan |
Theorem proving for modeling and conflict checking of authorization policies. |
ISCN |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Kuong-Ho Chen, Yuan-Siao Liu, Tzong-Jye Liu, Chyi-Ren Dow |
ZERO-Conflict: A Grouping-Based Approach for Automatic Generation of IPSec/VPN Security Policies. |
DSOM |
2006 |
DBLP DOI BibTeX RDF |
IP security, network management, security policy, security requirement, policy conflict |
22 | Ritu Chadha |
Beyond the Hype: Policies for Military Network Operations. |
ICSNC |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Adriana Felicia Gabor, Jan-Kees C. W. van Ommeren |
Note on a Class of Admission Control Policies for the Stochastic Knapsack Problem. |
AAIM |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Xiao Feng Li, Dengguo Feng |
Composing Administrative Scope of Delegation Policies based on extended XACML. |
EDOC |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Linping Wu, Chao Ren, Dan Meng, Jianfeng Zhan, Bibo Tu |
The Failure-rate Aware Scheduling Policies for Large-scale Cluster Systems. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 18116 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|