|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11972 occurrences of 4272 keywords
|
|
|
Results
Found 31127 publication records. Showing 31126 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Dan Lin 0001, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo 0001 |
Policy decomposition for collaborative access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 103-112, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
collaborative access control, policy decomposition |
28 | Radha Chauhan, Elsa Estevez, Tomasz Janowski |
A model for policy interventions in support of electronic governance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV 2008, Cairo, Egypt, December 1-4, 2008, pp. 199-205, 2008, ACM, 978-1-60558-386-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
policy interventions, electronic governance |
28 | Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu |
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 248-262, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Policy Interoperation, RBAC, Multi-Domain |
28 | Subhendu Aich, Shamik Sural, Arun K. Majumdar |
Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 118-127, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Spatiotemporal event, Policy connectives, Location hierarchy, RBAC |
28 | Cheng Tien Ee, Vijay Ramachandran, Byung-Gon Chun, Kaushik Lakshminarayanan, Scott Shenker |
Resolving inter-domain policy disputes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan, August 27-31, 2007, pp. 157-168, 2007, ACM, 978-1-59593-713-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
policy disputes, convergence, BGP, inter-domain routing |
28 | Bin Zhang 0007, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher |
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 185-194, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
firewall, policy language, conflicts free |
28 | Dan Lin 0001, Prathima Rao, Elisa Bertino, Jorge Lobo 0001 |
An approach to evaluate policy similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 1-10, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
XACML policies, policy similarity measure, access control policies |
28 | Lei Zheng |
Cross-national information policy conflict regarding access to information: building a conceptual framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 8th Annual International Conference on Digital Government Research, Bridging Disciplines & Domains, DG.O 2007, Philadelphia, Pennsylvania, USA, May 20-23, 2007, pp. 201-211, 2007, Digital Government Research Center, 1-59593-599-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
access to information, cross-national, conflict, international, information policy |
28 | Yu Cheng 0003, Wei Song 0001, Weihua Zhuang, Alberto Leon-Garcia, Rose Qingyang Hu |
Efficient Resource Allocation for Policy-Based Wireless/Wireline Interworking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 11(5), pp. 661-679, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
wireless/wireline interworking, cellular/WLAN integration, resource allocation, service level agreement, call admission control, policy-based networking |
28 | Wassim Itani, Ayman I. Kayssi, Ali Chehab |
An enterprise policy-based security protocol for protecting relational database network objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 343-348, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
customizable security, policy-driven security, security, relational databases |
28 | Torsten Klie, Lars C. Wolf |
Autonomic policy-based management using web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006, pp. 28, 2006, ACM, 1-59593-456-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
web services, policy-based management, autonomic communications |
28 | Wei-Tek Tsai, Xinxin Liu, Yinong Chen, Raymond A. Paul |
Simulation Verification and Validation by Dynamic Policy Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 38th Annual Simulation Symposium (ANSS-38 2005), 4-6 April 2005, San Diego, CA, USA, pp. 91-98, 2005, IEEE Computer Society, 0-7695-2322-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Automated Policy Specification and Enforcement, Simulation, Verification and Validation |
28 | Li Pan |
The impact of e-money on the monetary policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 856-859, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
monetary policy, impact, electronic money |
28 | Minxuan Zhang, Caixia Sun |
Enhancing DCache Warn Fetch Policy for SMT Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005, Proceedings, pp. 216-223, 2005, Springer, 3-540-29769-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
L2 cache miss, I-fetch Policy, Fetch Priority, Resource Allocation, SMT |
28 | Abhijit Gosavi |
A Reinforcement Learning Algorithm Based on Policy Iteration for Average Reward: Empirical Results with Yield Management and Convergence Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Learn. ![In: Mach. Learn. 55(1), pp. 5-29, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
average reward, reinforcement learning, policy iteration |
28 | Nirmal Mukhi, Pierluigi Plebani |
Supporting policy-driven behaviors in web services: experiences and issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2004, Second International Conference, New York, NY, USA, November 15-19, 2004, Proceedings, pp. 322-328, 2004, ACM, 1-58113-871-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
metadata exchange, web services, policy, service-oriented computing, LaTeX, ACM proceedings, text tagging |
28 | Wolfgang Böhm 0001, Peter Braun |
Policy Based Architecture for the UMTS Multimedia Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 16-18 April 2003, Cambridge, MA, USA, pp. 275-288, 2003, IEEE Computer Society, 0-7695-1938-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
QoS, UMTS, Bandwidth Broker, Policy Based Networking |
28 | Ting Yu 0001, Marianne Winslett |
Policy migration for sensitive credentials in trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 9-20, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
policy migration, trust negotiation |
28 | Xiaofeng Gong, Julian Newman |
The Role of Deontic Concepts and Commitment in the Policy Specification of Mobile Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, OTM Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and WRSM 2003, Catania, Sicily, Italy, November 3-7, 2003, Proceedings, pp. 807-815, 2003, Springer, 3-540-20494-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
deontic concepts, speech acts oriented communication, mobile computing, Commitment, commitments, security policy specification |
28 | Jacob Zimmermann, Ludovic Mé, Christophe Bidan |
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings, pp. 291-308, 2003, Springer, 3-540-20300-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Policy-based intrusion detection, access control, information flow control |
28 | Scott D. Carson, Sanjeev Setia |
Analysis of the Periodic Update Write Policy For Disk Cache. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 18(1), pp. 44-54, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
periodic update write policy, average access time, dirty cache blocks, disk read requests, cache-hit ratio, competing cache write policies, bulk arrivals, traffic jam effect, degraded service, write packages, scheduling, file systems, storage management, buffer storage, storage allocation, disk scheduling, data storage, computer systems, disk cache, design criteria, average response time |
27 | Janice Warner, Soon Ae Chun |
A citizen privacy protection model for e-government mashup services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 9th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2008, Montreal, Canada, May 18-21, 2008, pp. 188-196, 2008, Digital Government Research Center, 978-1-60558-099-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
citizen privacy, e-government mashup services, personal privacy policy network, regulatory privacy policy, web 2.0 |
27 | Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev |
Evaluating Access Control Policies Through Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 446-460, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control policy language, model checking, verification, access control, access control model, access control policy |
27 | Patrick C. K. Hung, Guang-Sha Qiu |
Implementing Conflict of Interest Assertions for Web Services Matchmaking Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 24-27 June 2003, Newport Beach, CA, USA, pp. 373-380, 2003, IEEE Computer Society, 0-7695-1969-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
WS-PolicyAttachment, Matchmaking, Conflict of interest, WS-Policy, Service locators, Chinese wall security policy |
27 | Michael J. Petkac, Lee Badger |
Security Agility in Response to Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 11-20, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
security agility, cooperative frameworks, malicious attacks, mission critical functionality, security policy reconfiguration, runtime security policy change, prototype toolkit, flexible host-based response, distributed systems, intrusion detection, distributed processing, software components, security of data |
27 | Anna Cinzia Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, Elisa Bertino |
Automatic Compliance of Privacy Policies in Federated Digital Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 89-92, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Prathima Rao, Dan Lin 0001, Elisa Bertino |
XACML Function Annotations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 178-182, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Bjørnar Solhaug, Dag Elgesem, Ketil Stølen |
Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 19-28, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hady S. AbdelSalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair |
Infrastructure-Aware Autonomic Manager for Change Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 66-69, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Nima Kaviani, Dragan Gasevic, Marek Hatala, Gerd Wagner 0001 |
Web Rule Languages to Carry Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 188-192, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Giovanni Russello, Changyu Dong, Naranker Dulay |
Authorisation and Conflict Resolution for Hierarchical Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 201-210, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Massimo Marchi, Alessandra Mileo, Alessandro Provetti |
Declarative Policies for Web Service Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 6-8 June 2005, Stockholm, Sweden, pp. 239-242, 2005, IEEE Computer Society, 0-7695-2265-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Elisa Bertino, Alessandra Mileo, Alessandro Provetti |
PDL with Preferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 6-8 June 2005, Stockholm, Sweden, pp. 213-222, 2005, IEEE Computer Society, 0-7695-2265-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | David J. Scott, Alastair R. Beresford, Alan Mycroft |
Spatial Policies for Sentient Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 147-157, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Niranjan Suri, Marco M. Carvalho, Jeffrey M. Bradshaw, Maggie R. Breedy, Thomas B. Cowin, Paul T. Groth, Raul Saavedra, Andrzej Uszok |
Enforcement of Communications Policies in Software Agent Systems through Mobile Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 247-250, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Stefano Bistarelli, Simon N. Foley |
Analysis of Integrity Policies using Soft Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 77-80, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | David Silver, Gerald Tesauro |
Monte-Carlo simulation balancing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML ![In: Proceedings of the 26th Annual International Conference on Machine Learning, ICML 2009, Montreal, Quebec, Canada, June 14-18, 2009, pp. 945-952, 2009, ACM, 978-1-60558-516-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor |
User-controllable learning of security and privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 11-18, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security and privacy policies, user-controllable learning, usable security |
26 | Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer |
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China, pp. 294-303, 2007, IEEE Computer Society, 1-4244-1588-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Luca Bertazzi, Giuseppe Paletta, Maria Grazia Speranza |
Minimizing the Total Cost in an Integrated Vendor - Managed Inventory System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Heuristics ![In: J. Heuristics 11(5-6), pp. 393-419, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Vendor-Managed Inventory VMI, heuristics, transportation, logistics, inventory |
26 | Wei Zhou 0006, Christoph Meinel, Vinesh H. Raja |
A Framework for Supporting Distributed Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 442-447, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jeong Geun Kim, Een-Kee Hong |
Opportunistic Scheduling for QoS Guarantees in 3G Wireless Links. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
PWC ![In: Personal Wireless Communications, IFIP TC6 9th International Conference, PWC 2004, Delft, The Netherlands, September 21-23, 2004, Proceedings, pp. 54-68, 2004, Springer, 3-540-23162-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Xiaopeng Xiong, Mohamed F. Mokbel, Walid G. Aref, Susanne E. Hambrusch, Sunil Prabhakar |
Scalable Spatio-temporal Continuous Query Processing for Location-aware Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSDBM ![In: Proceedings of the 16th International Conference on Scientific and Statistical Database Management (SSDBM 2004), 21-23 June 2004, Santorini Island, Greece, pp. 317-326, 2004, IEEE Computer Society, 0-7695-2146-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Edward G. Coffman Jr., Predrag R. Jelenkovic |
Threshold policies for single-resource reservation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 28(4), pp. 9-10, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Mayank Keshariya, Ray Hunt |
A new architecture for performance-based policy management in heterogeneous wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 97, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ABC (always best connected), PBM (policy-based management), RBAC (role-based access control), mapping translators, policy semantic and syntax analysis, vertical handoff |
26 | Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren |
Security policy analysis using deductive spreadsheets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 42-50, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SELinux policy, security policy analysis, vulnerability analysis |
26 | Benjamin B. Bederson, Jonathan Lazar, Jeff A. Johnson, Harry Hochheiser, Clare-Marie Karat |
Workshop on SIGCHI public policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 1655-1657, 2006, ACM, 978-1-59593-298-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
voting machines, accessibility, government, universal usability, government policy, information policy |
26 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann |
Email feedback: a policy-based approach to overcoming false positives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 73-82, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
email/spam control, policy advertisement, policy feedback, constraint logic programming |
26 | Adam Barth, John C. Mitchell, Justin Rosenstein |
Conflict and combination in privacy policy languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 45-46, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
policy combination, privacy policy |
26 | David B. Stewart, Pradeep K. Khosla |
Policy-independent real-time operating system mechanisms for timing error detection, handling and monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 1st High-Assurance Systems Engineering Workshop (HASE '96), October 22, 1996, Niagara, Canada, Proceedings, pp. 150-157, 1996, IEEE Computer Society, 0-8186-7629-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
supervisory programs, policy independent real time operating system mechanisms, timing error detection, estimated worst case execution times, missed deadline, policy independent mechanisms, real time task monitoring, reschedule operation, monitoring mechanism, 6 ms, 1 Kbyte, hard real time systems, scheduling policies, context switch, error handling |
26 | Ashok Vaseashta, Philip Susmann, Eric Braman |
Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 1-10, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Nazife Baykal |
Turkey's Approaches on Cyber Security Policy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 82-98, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Gevorg Margarov |
Strengthening Cyber Security Policy by Means of End-Users Dedicated Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 49-56, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | John Slankas, Laurie A. Williams |
Classifying Natural Language Sentences for Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, Chapel Hill, NC, USA, July 16-18, 2012, pp. 33-36, 2012, IEEE Computer Society, 978-1-4673-1993-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Mirko Montanari, Lucas T. Cook, Roy H. Campbell |
Multi-organization Policy-Based Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, Chapel Hill, NC, USA, July 16-18, 2012, pp. 70-77, 2012, IEEE Computer Society, 978-1-4673-1993-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Muhammad Ali Amer, Ann L. Chervenak, Weiwei Chen 0002 |
Improving Scientific Workflow Performance Using Policy Based Data Placement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, Chapel Hill, NC, USA, July 16-18, 2012, pp. 86-93, 2012, IEEE Computer Society, 978-1-4673-1993-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Leigh Griffin, Bernard Butler, Eamonn de Leastar, Brendan Jennings, Dmitri Botvich |
On the Performance of Access Control Policy Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, Chapel Hill, NC, USA, July 16-18, 2012, pp. 25-32, 2012, IEEE Computer Society, 978-1-4673-1993-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Nelson Matthys, Christophe Huygens, Danny Hughes 0001, Sam Michiels, Wouter Joosen |
A Component and Policy-Based Approach for Efficient Sensor Network Reconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, Chapel Hill, NC, USA, July 16-18, 2012, pp. 53-60, 2012, IEEE Computer Society, 978-1-4673-1993-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Konstantine Arkoudas, Shoshana Loeb, Ritu Chadha, C. Jason Chiang, Keith Whittaker |
Automated Policy Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, Chapel Hill, NC, USA, July 16-18, 2012, pp. 1-8, 2012, IEEE Computer Society, 978-1-4673-1993-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Wuliang Sun, Robert B. France, Indrakshi Ray |
Rigorous Analysis of UML Access Control Policy Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 9-16, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
LRBAC, UML, Alloy |
26 | Mark R. Beaumont, Chris North 0002, Bradley D. Hopkins, Ken Yiu |
Hard Disk Guard Based Policy Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 157-160, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
access control, information security, hard disks |
26 | Ron Banner, Omer Barkol, Ruth Bergman, Shahar Golan, Yuval Carmel, Ido Ish-Hurwitz, Oded Zilinsky |
Automatic Policy Rule Extraction for Configuration Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 125-128, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Bong Jun Ko, Starsky H. Y. Wong, Kang-Won Lee, Chi-Kin Chau |
Distributed Overlay Construction to Support Policy-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 49-56, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Ashish Gehani, Dawood Tariq, Basim Baig, Tanu Malik |
Policy-Based Integration of Provenance Metadata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 149-152, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
aggregation, flexible, fusion, lineage |
26 | Sebastian Speiser |
Policy of Composition ? Composition of Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 121-124, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Byung H. Park, Thomas J. Naughton, Pratul K. Agarwal, David E. Bernholdt, Al Geist, Jennifer L. Tippens |
Realization of User Level Fault Tolerant Policy Management through a Holistic Approach for Fault Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 17-24, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Nicola Dragoni, Eduardo Lostal, Davide Papini |
(SC)²: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 186-187, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Security-by-contract, open multi-application smart cards, secure communication |
26 | Sara Hachem, Alessandra Toninelli, Animesh Pathak, Valérie Issarny |
Policy-Based Access Control in Mobile Social Ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 57-64, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Ramani Routray, Rui Zhang, David M. Eyers, Douglas Willcocks, Peter R. Pietzuch, Prasenjit Sarkar |
Policy Generation Framework for Large-Scale Storage Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2010, IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010, pp. 65-72, 2010, IEEE Computer Society, 978-1-4244-8206-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Enrico Scalavino, Vaibhav Gowadia, Rudi Ball, Emil C. Lupu, Giovanni Russello |
Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2010, IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010, pp. 53-56, 2010, IEEE Computer Society, 978-1-4244-8206-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
crisis, policies, encryption, data security, opportunistic networks |
26 | David Evans 0002, David M. Eyers |
Efficient Policy Checking across Administrative Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2010, IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010, pp. 146-153, 2010, IEEE Computer Society, 978-1-4244-8206-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Grit Denker, Ashish Gehani, Minyoung Kim, David Hanz |
Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2010, IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010, pp. 120-128, 2010, IEEE Computer Society, 978-1-4244-8206-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Mohamed Shehab, Gorrell P. Cheek, Hakim Touati, Anna Cinzia Squicciarini, Pau-Chen Cheng |
User Centric Policy Management in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2010, IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010, pp. 9-13, 2010, IEEE Computer Society, 978-1-4244-8206-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Roshan K. Thomas, Giovanni Russello, Simon Tsang |
Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 76-83, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jéferson Campos Nobre, Lisandro Zambenedetti Granville |
Towards Consistency of Policy States in Decentralized Autonomic Network Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 170-173, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Alberto E. Schaeffer Filho, Emil C. Lupu, Morris Sloman, Susan Eisenbach |
Verification of Policy-Based Self-Managed Cell Interactions Using Alloy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 37-40, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Prathima Rao, Gabriel Ghinita, Elisa Bertino, Jorge Lobo 0001 |
Visualization for Access Control Policy Analysis Results Using Multi-level Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 25-28, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jochen Bauknecht, Johannes Häussler, Daniel Kraft, Marcus Q. Kuhnen, Mario Lischka, Anett Schülke |
Policy-Based Real-Time Decision-Making for Personalized Service Delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 53-59, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Said Marouf, Mohamed Shehab, Anna Cinzia Squicciarini, Smitha Sundareswaran |
Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 118-125, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Hoi Y. Chan, Thomas Kwok |
A Policy-Based Sensor Selection System with Goal Oriented Singular Value Decomposition Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 95-97, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Yuri Demchenko, Mihai Cristea, Cees de Laat |
XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 98-101, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Michael J. May, Carl A. Gunter, Insup Lee 0001, Steve Zdancewic |
Strong and Weak Policy Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 33-36, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Adrian Baldwin, Marco Casassa Mont, Simon Shiu |
Using Modelling and Simulation for Policy Decision Support in Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 17-24, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Joseane Farias Fidalgo, Carlos Alberto Kamienski, Ramide Dantas, Djamel Sadok, Börje Ohlman |
Policy Processing: Don't Take it for Granted. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 126-133, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Carl A. Gunter |
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 114-117, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Alan Jeffrey, Taghrid Samak |
Model Checking Firewall Policy Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 60-67, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Yathiraj B. Udupi, Munindar P. Singh |
Design Patterns for Policy-Based Service Engagements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 97-100, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Juri Luca De Coi, Daniel Olmedilla, Sergej Zerr, Piero A. Bonatti, Luigi Sauro |
A Trust Management Package for Policy-Driven Protection & Personalization of Web Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 228-230, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Cataldo Basile, Antonio Lioy, Gregorio Martínez Pérez, Félix J. García Clemente, Antonio Fernandez Gómez-Skarmeta |
POSITIF: A Policy-Based Security Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 280, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Bhavani Thuraisingham |
Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 8-11, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Elisa Bertino, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini |
Policy Languages for Digital Identity Management in Federation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 5-7 June 2006, London, Ontario, Canada, pp. 54-66, 2006, IEEE Computer Society, 0-7695-2598-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Karl Quinn, David Lewis 0001, Declan O'Sullivan, Vincent P. Wade |
Trust Meta-Policies for Flexible and Dynamic Policy Based Trust Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 5-7 June 2006, London, Ontario, Canada, pp. 145-148, 2006, IEEE Computer Society, 0-7695-2598-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Miguel Alves, Carlos Viegas Damásio, Wolfgang Nejdl, Daniel Olmedilla |
A Distributed Tabling Algorithm for Rule Based Policy Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 5-7 June 2006, London, Ontario, Canada, pp. 123-132, 2006, IEEE Computer Society, 0-7695-2598-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Harley Boughton, Patrick Martin 0001, Wendy Powley, Randy Horman |
Workload Class Importance Policy in Autonomic Database Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 5-7 June 2006, London, Ontario, Canada, pp. 13-22, 2006, IEEE Computer Society, 0-7695-2598-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Pankaj N. Parmar, Priya Rajagopal, Ravi Sahita |
Protocol Decode Based Stateful Firewall Policy Definition Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 7-9 June 2004, Yorktown Heights, NY, USA, pp. 201-, 2004, IEEE Computer Society, 0-7695-2141-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Antonio Di Ferdinando, Paul McKee, Alessandro Amoroso |
A Policy Based Approach for Automated Topology Management of Peer To Peer Networks and a Prototype Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 235-238, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | John Strassner |
How Policy Empowers Business-Driven Device Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 214-217, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Dinesh C. Verma, Mandis Beigi, Raymond B. Jennings III |
Policy Based SLA Management in Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings, pp. 137-152, 2001, Springer, 3-540-41610-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Hanan Lutfiyya, Gary Molenkamp, Michael Katchabaw, Michael A. Bauer 0001 |
Issues in Managing Soft QoS Requirements in Distributed Systems Using a Policy-Based Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings, pp. 185-201, 2001, Springer, 3-540-41610-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Distributed Systems, Policies, QoS Requirements |
26 | C. Dianne Martin, Ben Shneiderman, Tom Jewett, Keith W. Miller 0001, Marc Rotenberg (eds.) |
ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![ACM, 1-58113-038-4 The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
Displaying result #401 - #500 of 31126 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|