Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Stefania Costantini, Gaetano Aurelio Lanzarone |
Explanation-Based Interpretation of Open-Textured Concepts in Logical Models of Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 3(3), pp. 191-208, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
18 | Timothy Arnold-Moore |
Automatically Processing Amendments to Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: Proceedings of the Fifth International Conference on Artificial Intelligence and Law, ICAIL '95, College Park, Maryland, USA, May 21-24, 1995, pp. 297-306, 1995, ACM, 0-89791-758-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
18 | Radboud Winkels, Nienke den Haan |
Automated Legislative Drafting: Generating Paraphrases of Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: Proceedings of the Fifth International Conference on Artificial Intelligence and Law, ICAIL '95, College Park, Maryland, USA, May 21-24, 1995, pp. 112-118, 1995, ACM, 0-89791-758-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
18 | Leonardo Gatica |
Liberalization and tariff legislation in Chile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 32(11), pp. 34-35, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
18 | Wendy London |
EC information security legislation: Where now? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 10(5), pp. 226-233, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
18 | Andrey P. Kurilo |
The Current State of INFOSEC Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Control of Information Technology in Society ![In: Security and Control of Information Technology in Society, Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Illich and ashore at St. Petersburg, Russia, 12-17 August, 1993, pp. 77-81, 1993, North-Holland, 0-444-81831-6. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
18 | Thomas J. Galvin |
Leadership in Legislation and Public Policy Development: The Case of the American Library Association. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Libr. Trends ![In: Libr. Trends 40(3), 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
18 | Robert A. Kowalski |
Legislation as Logic Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Logic Programming Summer School ![In: Logic Programming in Action, Second International Logic Programming Summer School, LPSS '92, Zurich, Switzerland, September 7-11, 1992, Proceedings, pp. 203-230, 1992, Springer, 3-540-55930-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
18 | Robert A. Kowalski |
Legislation as Logic Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP ![In: Logic Programming, Proceedings of the Eigth International Conference, Paris, France, June 24-28, 1991, pp. 910, 1991, MIT Press, 0-262-56058-5. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP BibTeX RDF |
|
18 | William J. Caelli, David Edmond, E. A. Knight, Alan B. Tickle |
Implications of the tax file number legislation for computer professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Aust. Comput. J. ![In: Aust. Comput. J. 22(1), pp. 11-20, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
18 | Marc Rotenberg |
Prepared testimony and statement for the record on computer virus legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCAS Comput. Soc. ![In: SIGCAS Comput. Soc. 20(1), pp. 12-25, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
18 | Randy W. Dipner, Susan Brummel, Virginal Stern, Larry Oliver, Katherine D. Seelman, Bob Silverstein |
Impact of legislation on availability and use of technology by individuals with disabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CQL ![In: Proceedings of the Conference on Computers and the Quality of Life, CQL 1990, George Washington University, Washington, D.C., USA, September 13-16, 1990, pp. 34, 1990, ACM, 978-0-89791-403-1. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
18 | Michael J. Shpizner |
Congress passes new legislation protecting licensees of intellectual property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 4(5), pp. 27-28, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
18 | Robert A. Kowalski |
The Treatment of Negation in Logic Programs for Representing Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: Proceedings of the Second International Conference on Artificial Intelligence and Law, ICAIL '89, Vancouver, BC, Canada, June 13-16, 1989, pp. 11-15, 1989, ACM, 0-89791-322-1. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
18 | Buck BloomBecker |
US computer security legislation H.R. 145: A step toward greater computer security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 3(5), pp. 130-31, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
18 | J. A. L. Sterling |
Legislation update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 4(1), pp. 42-43, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
18 | J. A. L. Sterling |
Copyright legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 3(5), pp. 2-9, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
18 | Georgios I. Doukidis, Zisis Giannakos |
Formulating Information Technology Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Technol. ![In: J. Inf. Technol. 3(2), pp. 95-101, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
18 | Clive D. Thorne |
Copyright legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 3(4), pp. 12, 1987. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
18 | Trevor J. M. Bench-Capon, G. O. Robinson, Tom Routen, Marek J. Sergot |
Logic Programming for Large Scale Applications in Law: A Formalisation of Supplementary Benefit Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: Proceedings of the First International Conference on Artificial Intelligence and Law, ICAIL '87, Boston, MA, USA, May 27-29, 1987, pp. 190-198, 1987, ACM, 0-89791-230-6. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
18 | Trevor J. M. Bench-Capon |
Support for Policy Makers: Formulating Legislation with the Aid of Logical Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: Proceedings of the First International Conference on Artificial Intelligence and Law, ICAIL '87, Boston, MA, USA, May 27-29, 1987, pp. 181-189, 1987, ACM, 0-89791-230-6. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
18 | John J. Borking |
Software copyright part II: The new German legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 2(2), pp. 6, 1986. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
18 | Jay BloomBecker |
Lobbying for computer legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCAS Comput. Soc. ![In: SIGCAS Comput. Soc. 16(1), pp. 2-6, 1986. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
18 | Hans Peter Gassmann |
The Influence of George Orwell's "1984" on Privacy Protection Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 9, pp. 29-31, 1985. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
18 | Harold Joseph Highland |
U.S. computer crime legislation highlighted in special report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 4(3), pp. 245-246, 1985. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
18 | Irving Louis Horowitz, Mary E. Curtis |
Fair use versus fair return: Copyright legislation and its consequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Soc. Inf. Sci. ![In: J. Am. Soc. Inf. Sci. 35(2), pp. 67-74, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
18 | Jan Yestingsmeier |
Electronic funds transfer system: the continuing need for privacy legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCAS Comput. Soc. ![In: SIGCAS Comput. Soc. 13-14(4, 1-3), pp. 5-9, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
18 | David Bailey |
Attacks on Computers: Congressional Hearings and Pending Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984, pp. 180-187, 1984, IEEE Computer Society, 0-8186-0532-4. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
18 | James A. Thom, P. G. Thorne |
Privacy Legislation and the Right of Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Aust. Comput. J. ![In: Aust. Comput. J. 15(4), pp. 145-150, 1983. The full citation details ...](Pics/full.jpeg) |
1983 |
DBLP BibTeX RDF |
|
18 | Susan H. Nycum, Susan Courtney-Saunders |
Transborder data flow: legal persons in privacy protection legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1980 National Computer Conference, 19-22 May 1980, Anaheim, California, USA, pp. 587-593, 1980, AFIPS Press, 978-1-4503-7923-6. The full citation details ...](Pics/full.jpeg) |
1980 |
DBLP DOI BibTeX RDF |
|
18 | Godfrey Stadlen |
Survey of National Data Protection Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 3, pp. 174-186, 1979. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
|
18 | Susan Hubbell Nycum |
Legislation and its impact overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1978 National Computer Conference, June 5-8, 1978, Anaheim, CA, USA, pp. 1137-1138, 1978, AFIPS Press. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP BibTeX RDF |
|
18 | Willard Marcy |
The Role of the American Chemical Society Committee on Patent Matters and Related Legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Chem. Inf. Comput. Sci. ![In: J. Chem. Inf. Comput. Sci. 17(3), pp. 133-136, 1977. The full citation details ...](Pics/full.jpeg) |
1977 |
DBLP DOI BibTeX RDF |
|
18 | George Morrow II |
Impact of recent privacy legislation: Minnesota and federal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Annual Conference ![In: Proceedings of the 1975 ACM Annual Conference, Minneapolis, Minnesota, USA, October 20-22, 1975, pp. 354, 1975, ACM, 978-1-4503-7481-1. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
18 | Jens P. Christensen |
Is certification and licensing a viable alternative to privacy legislation? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCPR ![In: Proceedings of the thirteenth annual SIGCPR conference, SIGCPR 1975, Toronto, Ontario, Canada, June 19-20, 1975, pp. 11-25, 1975, ACM, 978-1-4503-7452-1. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
18 | James P. Titus |
Copyright revision legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 10(5), pp. 314-315, 1967. The full citation details ...](Pics/full.jpeg) |
1967 |
DBLP DOI BibTeX RDF |
|
11 | Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Giuseppe Bianchi 0001 |
Key escrow schemes with sliding window for privacy-aware anomaly detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT/ICDT Workshops ![In: Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010, ACM, 978-1-60558-990-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Shamir's scheme, privacy, sliding window, key revocation |
11 | Nathan Andrysco, Kevin R. Gurney, Bedrich Benes, Kathy Corbin |
Visual Exploration of the Vulcan CO2 Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Computer Graphics and Applications ![In: IEEE Computer Graphics and Applications 29(1), pp. 6-11, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Mingyu Feng, Neil T. Heffernan, Kenneth R. Koedinger |
Addressing the assessment challenge with an online system that tutors as it assesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
User Model. User Adapt. Interact. ![In: User Model. User Adapt. Interact. 19(3), pp. 243-266, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Dynamic assessment, Assistance metrics, Interactive tutoring, Intelligent tutoring system, ASSISTments |
11 | Laurens Mommers, Wim Voermans, Wouter Koelewijn, Hugo Kielman |
Understanding the law: improving legal knowledge dissemination by translating the contents of formal sources of law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 17(1), pp. 51-78, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Accessibility of legal information, Understandability of legal information |
11 | Scott Jordan |
Implications of Internet architecture on net neutrality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 9(2), pp. 5:1-5:28, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Tatjana Welzer, Marko Hölbl, Marjan Druzovec, Brane Klopcic, Bostjan Brumen, Hannu Jaakkola, Mirjam Bonacic |
Medical Personal Data in Secure Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UNISCON ![In: Information Systems: Modeling, Development, and Integration, Third International United Information Systems Conference, UNISCON 2009, Sydney, Australia, April 21-24, 2009. Proceedings, pp. 340-345, 2009, Springer, 978-3-642-01111-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, Information systems, personal data, medical records |
11 | Jostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, Herbjørn Andresen |
Reusable Security Requirements for Healthcare Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 380-385, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | R. A. Hilhorst, Tom M. van Engers |
e-dossier at the Dutch Council of State: design, implementation and lessons learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: The 12th International Conference on Artificial Intelligence and Law, Proceedings of the Conference, June 8-12, 2009, Barcelona, Spain, pp. 230-231, 2009, ACM, 978-1-60558-597-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
computer-assisted legal drafting and document management |
11 | Emile de Maat, Radboud Winkels |
A next step towards automated modelling of sources of law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: The 12th International Conference on Artificial Intelligence and Law, Proceedings of the Conference, June 8-12, 2009, Barcelona, Spain, pp. 31-39, 2009, ACM, 978-1-60558-597-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
automatic classification of norms, natural language processing |
11 | Saeed Ahmadi Behnam, Daniel Amyot, Alan J. Forster, Liam Peyton, Azalia Shamsaei |
Goal-Driven Development of a Patient Surveillance Application for Improving Patient Safety. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCETECH ![In: E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings, pp. 65-76, 2009, Springer, 978-3-642-01186-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Adverse Events, Business Process Modeling, Health Care, Goal Modeling, Patient Safety, User Requirements Notation |
11 | Maurice Nijssen, Inge M. C. Lemmens, Ralph Mak |
Fact-Orientation Applied to Develop a Flexible Employment Benefits System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems: OTM 2009 Workshops, Confederated International Workshops and Posters, ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009, Vilamoura, Portugal, November 1-6, 2009. Proceedings, pp. 745-756, 2009, Springer, 978-3-642-05289-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Fact Oriented Modeling, Fact Based Modeling, Compliance Modeling, NIAM2007, CogNIAM, Doctool, Natural Language, Case Study, Business Rules, BPMN, OMG, SBVR |
11 | Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung |
Behavioral Attestation for Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, pp. 343-350, 2009, IEEE Computer Society, 978-0-7695-3709-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Michael Stieghahn, Thomas Engel 0001 |
Law-aware access control for international financial environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiDE ![In: Eighth ACM International Workshop on Data Engineering for Wireless and Mobile Access, Mobide 2009, June 29, 2009, Providence, Rhode Island, USA, Proceedings, pp. 33-40, 2009, ACM, 978-1-60558-712-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
legal constraints, access control, context-awareness |
11 | Leila Takayama, Jo Ann G. Sison, Brian Lathrop, Nicholas Wolfe, Abe Chiang, Alexia Nielsen, Clifford Nass |
Bringing design considerations to the mobile phone and driving debate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 1643-1646, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
driver safety, driver user interfaces, side tones, speaker location, voice user interfaces |
11 | Yiwei Gong, Marijn Janssen, Sietse Overbeek, Arre Zuurmond |
Enabling flexible processes by ECA orchestration architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, Colombia, November 10-13, 2009, pp. 19-26, 2009, ACM, 978-1-60558-663-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
orchestration architecture, flexibility, business process management, event-condition-action |
11 | Juan M. Luzuriaga, Rodolfo Martínez, Alejandra Cechich |
Design and implementation of an electronic signature solution in the Justice Area. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, Colombia, November 10-13, 2009, pp. 299-304, 2009, ACM, 978-1-60558-663-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication, standardization, software process improvement (SPI), electronic signature |
11 | Dimitris Vassis, Petros Belsis, Christos Skourlas, Stefanos Gritzalis |
End to end secure communication in ad-hoc assistive medical environments using secure paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2009, Corfu, Greece, June 9-13, 2009, 2009, ACM, 978-1-60558-409-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information retrieval, security and privacy, medical information systems, wireless environments |
11 | Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
Location Privacy in RFID Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 127-150, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Michael Fichter, Michael Klein, Andreas Schmidt 0007 |
Transformation of Products between Various Versions of the Rule World of a Product Configurator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Next-Generation Applied Intelligence, 22nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2009, Tainan, Taiwan, June 24-27, 2009. Proceedings, pp. 721-730, 2009, Springer, 978-3-642-02567-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Henrique Lopes Cardoso, Eugénio C. Oliveira |
Flexible deadlines for directed obligations in agent-based business contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1307-1308, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
normative behavior, contract, norms, deadline |
11 | Eleni Kosta, Christos Kalloniatis, Lilian Mitrou, Evangelia Kavakli |
Search Engines: Gateway to a New "Panopticon"? ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings, pp. 11-21, 2009, Springer, 978-3-642-03747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, search engines, cookies, search logs |
11 | Mark Blythe, Peter C. Wright |
Technology scruples: why intimidation will not save the recording industry and how enchantment might. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 12(5), pp. 411-420, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Digital reproduction, Experience centred design, Music, Ethics, Copyright, Grounded theory, Enchantment |
11 | Gordon Hughes, Sophie Dawson, Tim Brookes |
Considering New Privacy Laws in Australia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(3), pp. 57-59, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Panayiotis Kotzanikolaou |
Data Retention and Privacy in Electronic Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(5), pp. 46-52, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Manish Gupta 0004, Shamik Banerjee, Manish Agrawal, H. Raghav Rao |
Security analysis of Internet technology components enabling globally distributed workplaces - a framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 8(4), pp. 17:1-17:38, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
globally distributed workforce, risk management, Internet applications, Security analysis |
11 | Janice C. Sipior, Burke T. Ward |
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 10(1), pp. 3-18, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Legal protection, Privacy, Trust, Spyware |
11 | Ivan Arsie, Cesare Pianese, Marco Sorrentino |
Recurrent Neural Networks for AFR Estimation and Control in Spark Ignition Automotive Engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence in Automotive Applications ![In: Computational Intelligence in Automotive Applications, pp. 145-168, 2008, Springer, 978-3-540-79256-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Ahmed A. Ataullah, Ashraf Aboulnaga, Frank Wm. Tompa |
Records retention in relational database systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, Napa Valley, California, USA, October 26-30, 2008, pp. 873-882, 2008, ACM, 978-1-59593-991-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
business records, legal compliance, records retention, privacy, relational systems |
11 | Kimberly C. Claffy |
"Show me the data": resolving challenges in network data sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 21-22, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
protected data-sharing, anonymization |
11 | Viola Schmid |
Radio Frequency Identification Law Beyond 2007. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOT ![In: The Internet of Things, First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings, pp. 196-213, 2008, Springer, 978-3-540-78730-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Helen Petrie, Christopher Power, Ray Adams, Faustina Hwang, Gerhard Weber 0002, Jenny S. Darzentas, Carlos A. Velasco |
Innovations in measuring accessibility: theoretical and practical perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (2) ![In: Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction - Volume 2, BCS HCI 2008, Liverpool, United Kingdom, 1-5 September 2008, pp. 197-198, 2008, BCS, 978-1-906124-06-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
accessibility, older people, disabled people, theory and methods |
11 | Driss Choujaa, Naranker Dulay |
Towards context-aware face anonymisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUM ![In: Proceedings of the 7th International Conference on Mobile and Ubiquitous Multimedia, MUM 2008, Umeå, Sweden, December 3-5, 2008, pp. 137-144, 2008, ACM, 978-1-60558-192-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
face blurring, context awareness, anonymity, cameraphone |
11 | Jan Porekar, Aljosa Jerman-Blazic, Tomaz Klobucar |
Towards Organizational Privacy Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Second International Conference on the Digital Society (ICDS 2008), February 10-15, 2008, Sainte Luce, Martinique, France, pp. 15-19, 2008, IEEE Computer Society, 978-0-7695-3087-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PET – privacy enhancing technologies, privacy, patterns |
11 | Bart Orriëns, Willem-Jan van den Heuvel, Mike P. Papazoglou |
On the Risk Management and Auditing of SOA Based Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA ![In: Leveraging Applications of Formal Methods, Verification and Validation, Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008. Proceedings, pp. 124-138, 2008, Springer, 978-3-540-88478-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Simon Tjoa, Stefan Jakoubi, Gerald Quirchmayr |
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 179-186, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
risk-aware business process simulation, business continuity planning, business impact analysis, risk assessment |
11 | Grigorios Kyriakopoulos |
Evaluation of the Energy Efficiency of Renewable Biomass Fuels: An Environmental and Financial Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSKS (2) ![In: The Open Knowlege Society. A Computer Science and Information Systems Manifesto, First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings, pp. 125-136, 2008, Springer, 978-3-540-87782-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Biofuels, Financial Feasibility, Renewable Energy Sources, Life Cycle Analysis, Environmental Sustainability |
11 | Ismael Hasan, Javier Parapar, Roi Blanco |
Segmentation of Legislative Documents Using a Domain-Specific Lexicon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 665-669, 2008, IEEE Computer Society, 978-0-7695-3299-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Legislative documents, domain lexicon, segmentation |
11 | Shao Wei-jie |
An Analysis to the Protection of Commercial Secrets and Strategies to Protect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (5) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 5: E-learning and Knowledge Management / Socially Informed and Instructinal Design / Learning Systems Platforms and Architectures / Modeling and Representation / Other Applications , December 12-14, 2008, Wuhan, China, pp. 415-420, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Tommaso Agnoloni, Lorenzo Bacci, Enrico Francesconi |
Ontology Based Legislative Drafting: Design and Implementation of a Multilingual Knowledge Resource. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EKAW ![In: Knowledge Engineering: Practice and Patterns, 16th International Conference, EKAW 2008, Acitrezza, Italy, September 29 - October 2, 2008. Proceedings, pp. 364-373, 2008, Springer, 978-3-540-87695-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multilingual Legal Ontologies Lexicon NLP |
11 | Blaz Fortuna, Jan Rupnik, Bostjan Pajntar, Marko Grobelnik, Dunja Mladenic |
Cross-lingual search over 22 european languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2008, Singapore, July 20-24, 2008, pp. 883, 2008, ACM, 978-1-60558-164-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dynamic search ranking, cross-lingual information retrieval, canonical correlation analysis, search result visualization |
11 | Oliver Jorns, Oliver Jung, Gerald Quirchmayr |
A platform for the development of location-based mobile applications with privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 120-127, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Akhil Kumar 0001, Rong Liu |
A Rule-Based Framework Using Role Patterns for Business Process Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RuleML ![In: Rule Representation, Interchange and Reasoning on the Web, International Symposium, RuleML 2008, Orlando, FL, USA, October 30-31, 2008. Proceedings, pp. 58-72, 2008, Springer, 978-3-540-88807-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
generic role patterns, compliant business process, task categories, declarative approach, Sarbanes-oxley, constraints, rules, separation of duty, internal control, control policies |
11 | J. Javier Samper, F. Javier Adell, Leo van den Berg, Juan José Martínez-Durá, Santiago Felici |
An ontological infrastructure for the automatic control of freight transport. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2008 Euro American conference on Telematics and Information Systems, EATIS 2008, Aracaju, Brazil, September 10-12, 2008, 2008, 978-1-59593-988-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
freight transport, ontologies, web services, traffic information, semantic descriptions |
11 | Ed Brown, Tracy Ann Kosa |
Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 232-239, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Esraa Omran, Albert Bokma, Shereef Abu Al-Maati |
Chain ontology based: A model for protecting personal information privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 363-368, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Efthimios Tambouris |
Introducing the need for a domain model in Public Service Provision (PSP) eGovernment Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 794-799, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Wolfgang Kahlig |
Legal cognitive decision processing towards a dynamic taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 387-392, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Craig W. Thompson, Dale R. Thompson |
Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 11(3), pp. 82-85, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Identity Solutions Symposium, RFID, smart cards, Identity management, identity theft, ID |
11 | André Gräning, Harald Kienegger |
Standardisierung der europaweiten Berichterstattung im Rahmen der Messung der Gesamtenergieeffizienz von Gebäuden. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinf. ![In: Wirtschaftsinf. 49(5), pp. 370-379, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Energy Effiency, Data Analysis, Data Exchange, Standardisation, Reporting, Internationalisation, XBRL |
11 | Brandi Ortega |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(4), pp. 6-9, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Pamela Samuelson |
Patent reform through the courts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 50(2), pp. 19-23, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Fady Farah, François Rousselot |
DARES: Documents annotation and recombining system - Application to the European law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 15(2), pp. 83-102, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
documents fragments recombination, XML, user model, annotation, expert system |
11 | Eleni Kosta, Martin Meints, Marit Hansen, Mark Gasson |
An analysis of security and privacy issues relating to RFID enabled ePassports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 467-472, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Eleanor Lisney, Christina Li, Songtao Liu |
The Potential of Web Accessibility in China: A Hypothesis on Its Impact on the Global Web Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (7) ![In: Universal Access in Human-Computer Interaction. Applications and Services, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 Held as Part of HCI International 2007 Beijing, China, July 22-27, 2007 Proceedings, Part III, pp. 79-87, 2007, Springer, 978-3-540-73282-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
usability, language, visually impaired, web accessibility, universal design, China, Chinese |
11 | Peter Winkler 0001 |
Luck vs. Skill. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAAN ![In: Combinatorial and Algorithmic Aspects of Networking, 4th Workshop, CAAN 2007, Halifax, Canada, August 14, 2007. Revised Papers, pp. 1, 2007, Springer, 978-3-540-77293-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Ziv Baida, Jianwei Liu 0007, Yao-Hua Tan |
Towards a Methodology for Designing E-Government Control Procedures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government, 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 56-67, 2007, Springer, 978-3-540-74443-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
e-Customs, G2B, procedure redesign, e-Government, conceptual modeling, design methodology |
11 | Vincenzo Galdi, Vincenzo Loia, Antonio Piccolo, Mario Veniero |
Fuzzy Pro-active Agents as Key Issue to Increase Traffic Safety for Next Generation Tunnels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUZZ-IEEE ![In: FUZZ-IEEE 2007, IEEE International Conference on Fuzzy Systems, Imperial College, London, UK, 23-26 July, 2007, Proceedings, pp. 1-6, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Dimitris Karagiannis, John Mylopoulos, Margit Schwab |
Business Process-Based Regulation Compliance: The Case of the Sarbanes-Oxley Act. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 15th IEEE International Requirements Engineering Conference, RE 2007, October 15-19th, 2007, New Delhi, India, pp. 315-321, 2007, IEEE Computer Society, 0-7695-2935-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Ivar Jacobson |
Enough of RE Processes- Let's Do Practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 15th IEEE International Requirements Engineering Conference, RE 2007, October 15-19th, 2007, New Delhi, India, 2007, IEEE Computer Society, 0-7695-2935-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Paul N. Otto, Annie I. Antón |
Addressing Legal Requirements in Requirements Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 15th IEEE International Requirements Engineering Conference, RE 2007, October 15-19th, 2007, New Delhi, India, pp. 5-14, 2007, IEEE Computer Society, 0-7695-2935-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | William Bradley Glisson, L. Milton Glisson, Ray Welland |
Secure Web Application Development and Global Regulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 681-688, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Marcin Gorawski, Jakub Bularz |
Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 837-844, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Jeffrey P. Bigham, Richard E. Ladner |
Accessmonkey: a collaborative scripting framework for web users and developers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
W4A ![In: Proceedings of the 2007 International Cross-Disciplinary Conference on Web Accessibility (W4A 2007), Banff, Canada, May 7-8, 2007, pp. 25-34, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
accessmonkey, alternative text, greasemonkey, web scripting, web transcoding, web accessibility |
11 | Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone |
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: The Eleventh International Conference on Artificial Intelligence and Law, Proceedings of the Conference, June 4-8, 2007, Stanford Law School, Stanford, California, USA, pp. 149-153, 2007, ACM, 978-1-59593-680-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
legal requirements, pattern validation, security & privacy patterns, organization, health care |