|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 10474 occurrences of 3799 keywords
|
|
|
Results
Found 18116 publication records. Showing 18116 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Ling Chen 0001, Wei Liu, Gencai Chen |
Effects of Filtering Policies on Task Performance in a Desktop CVE System. |
Edutainment |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Mathias Sallé, Giuliano Di Vitantonio |
Business Service Management: The Impact of IT Governance Models on IT Management Policies. |
IEEE SCC |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Ranga Raju Vatsavai, Sharma Chakravarthy, Mukesh K. Mohania |
Access Control Inference And Feedback For Policy Managers: A Fine-Grained Analysis. |
POLICY |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Karsten Sohr, Gail-Joon Ahn, Lars Migge |
Articulating and enforcing authorisation policies with UML and OCL. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
UML |
22 | Indrakshi Ray |
Applying Semantic Knowledge to Real-Time Update of Access Control Policies. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Claudia López, Hernán Astudillo |
Explicit Architectural Policies to Satisfy NFRs Using COTS. |
MoDELS (Satellite Events) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Daniela Rosu 0001, Asit Dan |
Managing End-to-End Lifecycle of Global Service Policies. |
ICSOC |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Bei Shui Liao, Ji Gao |
A Model of Multi-agent System Based on Policies and Contracts. |
CEEMAS |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Lawrence Teo, Gail-Joon Ahn |
Supporting access control policies across multiple operating systems. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
Chameleos, access control, operating systems, flexibility, extensibility, policy specification |
22 | Andrew C. Myers |
Programming with Explicit Security Policies. |
ESOP |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Fen Xie, Margaret Martonosi, Sharad Malik |
Efficient behavior-driven runtime dynamic voltage scaling policies. |
CODES+ISSS |
2005 |
DBLP DOI BibTeX RDF |
runtime dynamic voltage scaling, low power |
22 | David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn |
Composing and combining policies under the policy machine. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
access control, role based access control, separation of duty, multi-level security |
22 | Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev |
Evaluating Access Control Policies Through Model Checking. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
access control policy language, model checking, verification, access control, access control model, access control policy |
22 | Ameet Patil, Neil C. Audsley |
Implementing Application Specific RTOS Policies using Reflection. |
IEEE Real-Time and Embedded Technology and Applications Symposium |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Fabrício Benevenuto, Fernando Duarte, Virgílio A. F. Almeida, Jussara M. Almeida |
Web Cache Replacement Policies: Properties, Limitations and Implications. |
LA-WEB |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Zhenghua Fu, Nalini Venkatasubramanian |
Directory-based composite routing and scheduling policies for dynamic multimedia environments. |
Multim. Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Michael Backes 0001, Günter Karjoth, Walid Bagga, Matthias Schunter |
Efficient comparison of enterprise privacy policies. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
policy comparison, privacy policy |
22 | Vitalian A. Danciu, Bernhard Kempter |
From processes to policies - concepts for large scale policy generation. |
NOMS (1) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Frank Padberg |
Computing Optimal Scheduling Policies for Software Projects. |
APSEC |
2004 |
DBLP DOI BibTeX RDF |
|
22 | William H. Stufflebeam, Annie I. Antón, Qingfeng He, Neha Jain |
Specifying privacy policies with P3P and EPAL: lessons learned. |
WPES |
2004 |
DBLP DOI BibTeX RDF |
privacy, requirements engineering, healthcare, P3P, policy specification, EPAL |
22 | Michael McDougall, Rajeev Alur, Carl A. Gunter |
A model-based approach to integrating security policies for embedded devices. |
EMSOFT |
2004 |
DBLP DOI BibTeX RDF |
policy integration, smartcards, model based design, Java cards |
22 | Adam Wierzbicki, Nathaniel Leibowitz, Matei Ripeanu, Rafal Wozniak |
Cache replacement policies revisited: the case of P2P traffic. |
CCGRID |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Michael Backes 0001, Markus Dürmuth, Rainer Steinwandt |
An Algebra for Composing Enterprise Privacy Policies. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
Security Policies to Mitigate Insider Threat in the Document Control Domain. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Anne H. Anderson |
An Introduction to the Web Services Policy Language (WSPL). |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Angus Graham, Thiruvengadam Radhakrishnan, Clifford Grossner |
Incremental Validation of Policy-Based Systems. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Dakshi Agrawal, James Giles, Kang-Won Lee, Kaladhar Voruganti, Khalid Filali-Adib |
Policy-Based Validation of SAN Configuration. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Hao Wang, Somesh Jha, Miron Livny, Patrick D. McDaniel |
Security Policy Reconciliation in Distributed Computing Environments. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Michael Backes 0001, Markus Dürmuth, Günter Karjoth |
Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Junghoo Cho, Hector Garcia-Molina |
Effective page refresh policies for Web crawlers. |
ACM Trans. Database Syst. |
2003 |
DBLP DOI BibTeX RDF |
page refresh, world-wide web, web search engines, Web crawlers |
22 | Joseph Y. Halpern, Vicky Weissman |
Using First-Order Logic to Reason about Policies. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman |
Enforcing Security Policies for Distributed Objects Applications. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Sharman Lichtenstein, Paula M. C. Swatman, Kanchan Babu |
Adding Value to Online Privacy for Consumers: Remedying Deficiences in Online Privacy Policies with an Holistic Approac. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Richard Hull 0001, Bharat Kumar, Daniel F. Lieuwen |
Towards Federated Policy Management. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati |
An algebra for composing access control policies. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
Access control, logic programs, algebra, policy composition |
22 | Yixin Diao, Neha Gandhi, Joseph L. Hellerstein, Sujay S. Parekh, Dawn M. Tilbury |
Using MIMO feedback control to enforce policies for interrelated metrics with application to the Apache Web server. |
NOMS |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Manuel Koch, Francesco Parisi-Presicce |
Describing Policies with Graph Constraints and Rules. |
ICGT |
2002 |
DBLP DOI BibTeX RDF |
|
22 | William H. Winsborough, Ninghui Li |
Towards Practical Automated Trust Negotiation. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Ognjen Prnjat, Ioannis Liabotis, Temitope Olukemi, Lionel Sacks, Mike Fisher, Paul McKee, Ken Carlberg, Gregorio Martínez Pérez |
Policy-based Management for ALAN-Enabled Networks. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Patricia Lago |
A Policy-based Approach to Personalization of Communication over Converged Networks. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Andreas Schaad, Jonathan D. Moffett |
Delegation of Obligations. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Appan Ponnappan, Lingjia Yang, R. Radhakrishna Pillai, Peter Braun |
A Policy Based QoS Management System for the IntServ/DiffServ Based Internet. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
Foundations for a Graph-Based Approach to the Specification of Access Control Policies. |
FoSSaCS |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Einar Snekkenes |
Concepts for personal location privacy policies. |
EC |
2001 |
DBLP DOI BibTeX RDF |
iMode privacy policy, UMTS, GSM, EDGE, GPRS, PCS |
22 | Hans Vandierendonck, Koenraad De Bosschere |
A Comparison of Locality-Based and Recency-Based Replacement Policies. |
ISHPC |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Ian Welch, Robert J. Stroud |
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Martin F. Arlitt, Rich Friedrich, Tai Jin |
Performance Evaluation of Web Proxy Cache Replacement Policies. |
Computer Performance Evaluation (Tools) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Marc Abrams, Charles R. Standridge, Ghaleb Abdulla, Edward A. Fox, Stephen M. Williams |
Removal Policies in Network Caches for World-Wide Web Documents. |
SIGCOMM |
1996 |
DBLP DOI BibTeX RDF |
Internet, World Wide Web (WWW) |
22 | Dennis Lee 0001, Jean-Loup Baer, Brad Calder, Dirk Grunwald |
Instruction Cache Fetch Policies for Speculative Execution. |
ISCA |
1995 |
DBLP DOI BibTeX RDF |
C++ |
22 | Cathy McCann, John Zahorjan |
Processor Allocation Policies for Message-Passing Parallel Computers. |
SIGMETRICS |
1994 |
DBLP DOI BibTeX RDF |
|
22 | Asit Dan, Philip S. Yu |
Performance Analysis of Coherency Control Policies through Lock Retention. |
SIGMOD Conference |
1992 |
DBLP DOI BibTeX RDF |
|
21 | Kumar Avijit, Anupam Datta, Robert Harper 0001 |
Distributed programming with distributed authorization. |
TLDI |
2010 |
DBLP DOI BibTeX RDF |
phase distinction, proof-carrying authorization, distributed programming, logical frameworks, authorization logic |
21 | Arlindo L. Marcon Jr., Altair Olivo Santin, Luiz A. de Paula Lima Jr., Maicon Stihler |
Policy management architecture based on provisioning model and authorization certificates. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
authorization certificates and web services security, policy provisioning, policy management |
21 | Behzad Malek, Ali Miri |
Combining Attribute-Based and Access Systems. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | David Vengerov |
A reinforcement learning framework for online data migration in hierarchical storage systems. |
J. Supercomput. |
2008 |
DBLP DOI BibTeX RDF |
Self-optimizing systems, Multi-tier storage, Fuzzy rulebase, Reinforcement learning, Markov decision process, Cost functions, Data migration |
21 | Mudhakar Srivatsa, Nithya Rajamani, Murthy V. Devarakonda |
A Policy Evaluation Tool for Multisite Resource Management. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Mohamed A. Sharaf, Panos K. Chrysanthis, Alexandros Labrinidis, Kirk Pruhs |
Algorithms and metrics for processing multiple heterogeneous continuous queries. |
ACM Trans. Database Syst. |
2008 |
DBLP DOI BibTeX RDF |
continuous queries, Data stream management system, operator scheduling |
21 | Alex X. Liu, Fei Chen 0001, JeeHyun Hwang, Tao Xie 0001 |
Xengine: a fast and scalable XACML policy evaluation engine. |
SIGMETRICS |
2008 |
DBLP DOI BibTeX RDF |
policy decision point (PDP), policy enforcement point (PEP), access control, web server, XACML, policy evaluation |
21 | Takao Kojima, Yukio Itakura |
Proposal of privacy policy matching engine. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
identity-related data, vendor relationship management, search engine, privacy policy |
21 | Kevin Carey, Vincent Wade |
Realising Adaptive Web Services through Automated Policy Refinement. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Martin Eggenberger, Nupur Prakash, Koji Matsumoto, Darrell Thurmond |
Policy Based Messaging Framework. |
ICSOC |
2007 |
DBLP DOI BibTeX RDF |
Dependency Injection, QoS, Ontologies, Service Oriented Architecture, Policy, Queuing, Adaptive Services |
21 | Hui Chen 0001, Yang Xiao 0001, Xuemin Shen |
Update-Based Cache Access and Replacement in Wireless Data Access. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
wireless network, access, update, Cache replacement policy |
21 | Marinos Charalambides, Paris Flegkas, George Pavlou, Javier Rubio-Loyola, Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Morris Sloman, Naranker Dulay |
Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Fernando Fernández 0001, Manuela M. Veloso |
Probabilistic policy reuse in a reinforcement learning agent. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Luca Bertazzi, Giuseppe Paletta, Maria Grazia Speranza |
Minimizing the Total Cost in an Integrated Vendor - Managed Inventory System. |
J. Heuristics |
2005 |
DBLP DOI BibTeX RDF |
Vendor-Managed Inventory VMI, heuristics, transportation, logistics, inventory |
21 | Dakshi Agrawal, Seraphin B. Calo, James Giles, Kang-Won Lee, Dinesh C. Verma |
Policy management for networked systems and applications. |
Integrated Network Management |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Chetan Shiva Shankar, Roy H. Campbell |
A Policy-based Management Framework for Pervasive Systems using Axiomatized Rule-Actions. |
NCA |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Alexandros Koulouris, Sarantos Kapidakis |
Policy Model for University Digital Collections. |
ECDL |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Wei-Tek Tsai, Xinxin Liu, Yinong Chen, Raymond A. Paul |
Simulation Verification and Validation by Dynamic Policy Enforcement. |
Annual Simulation Symposium |
2005 |
DBLP DOI BibTeX RDF |
Automated Policy Specification and Enforcement, Simulation, Verification and Validation |
21 | Rohit Lotlikar, Ranga Raju Vatsavai, Mukesh K. Mohania, Sharma Chakravarthy |
Policy Schedule Advisor for Performance Management. |
ICAC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Paul P. Maglio, Christopher S. Campbell, Eser Kandogan |
On the Need for Negotiation in Policy-based Interaction with Autonomic Computing Systems. |
ICAC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Simon Fischer 0001, Berthold Vöcking |
Adaptive routing with stale information. |
PODC |
2005 |
DBLP DOI BibTeX RDF |
(evolutionary) game theory, stale information, adaptive routing |
21 | Indrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini, Elena Ferrari |
Anonymity Preserving Techniques in Trust Negotiations. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Gilles Barthe, Mariela Pavlova, Gerardo Schneider |
Precise Analysis of Memory Consumption using Program Logics. |
SEFM |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Catherine Rosenberg, Pascal Pons, Dongyan Xu |
Policy-driven multifile distribution. |
IWQoS |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Benoît Encelle, Nadine Baptiste-Jessel |
Adapting Presentation and Interaction with XML Documents to User Preferences. |
ICCHP |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Haifeng Shen, Chengzheng Sun |
Flexible Merging for Asynchronous Collaborative Systems. |
OTM |
2002 |
DBLP DOI BibTeX RDF |
document merging, Collaborative system, operational transformation, version control system |
21 | Vangalur S. Alagar, Kasilingam Periyasamy |
Specification and Verification of Secure Business Transaction Systems. |
SOFSEM |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Lixin Gao, Jennifer Rexford |
Stable internet routing without global coordination. |
IEEE/ACM Trans. Netw. |
2001 |
DBLP DOI BibTeX RDF |
Internet, Internet, routing, protocols, convergence, Border Gateway Protocol (BGP) |
21 | Lixin Gao, Jennifer Rexford |
Stable Internet routing without global coordination. |
SIGMETRICS |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Timothy Griffin, F. Bruce Shepherd, Gordon T. Wilfong |
Policy Disputes in Path-Vector Protocols. |
ICNP |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Derek R. Atkins, Hong Chen |
Performance evaluation of scheduling control of queueing networks: Fluid model heuristics. |
Queueing Syst. Theory Appl. |
1995 |
DBLP DOI BibTeX RDF |
Dynamic scheduling control, fluid network, simulation, queueing theory, queueing network, flow control |
21 | Nacira Guerroudji |
Logical model for administration policy specification. |
ACM Southeast Regional Conference |
1995 |
DBLP DOI BibTeX RDF |
|
21 | Rohit Chandra, Scott Devine, Ben Verghese, Anoop Gupta, Mendel Rosenblum |
Scheduling and Page Migration for Multiprocessor Compute Servers. |
ASPLOS |
1994 |
DBLP DOI BibTeX RDF |
|
21 | Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
A Logic for Reasoning About Security. |
ACM Trans. Comput. Syst. |
1992 |
DBLP DOI BibTeX RDF |
composition knowledge, security, integrity, policy, time, logic, secrecy, permission, obligation, possible-worlds |
19 | Siani Pearson, Marco Casassa Mont |
Sticky Policies: An Approach for Managing Privacy across Multiple Parties. |
Computer |
2011 |
DBLP DOI BibTeX RDF |
EnCoRe, Security and privacy, Privacy management, Sticky policies |
19 | Steffen Kunz, Benjamin Fabian, Daniel Marx 0001, Sebastian Müller 0001 |
Engineering Policies for Secure Interorganizational Information Flow. |
EDOCW |
2011 |
DBLP DOI BibTeX RDF |
Interorganizational Processes, RBAC, Access Control Policies |
19 | Mahmoud Ghorbel, Armen Aghasaryan, Marie-Pascale Dupont, Stéphane Betgé-Brezetz, Guy-Bertrand Kamga, Sophie Piekarec |
A Multi-environment Application of Privacy Data Envelopes. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
privacy, metadata, plugin, sticky policies |
19 | Hasan T. Karaoglu, Murat Yuksel |
Inter-domain Multi-Hop Negotiation for the Internet. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
Multi-hop Negotiation, Clean Slate, Inter-domain Routing, Routing Policies |
19 | Steve Barker, Gillian Lowen |
GPF: A General Policy Framework. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
Policies, Policy Languages, Policy Models |
19 | Meg Cramer, Gillian R. Hayes |
Acceptable Use of Technology in Schools: Risks, Policies, and Promises. |
IEEE Pervasive Comput. |
2010 |
DBLP DOI BibTeX RDF |
acceptable use policies, Mobile phones, social media |
19 | Leo A. Meyerovich, V. Benjamin Livshits |
ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
Web and client-side programming, language security, security policies, JavaScript, aspects, browsers |
19 | Amit Sangroya, Kirti Garg, Vasudeva Varma |
SAGE: An Approach to Evaluate the Impact of SOA Governance Policies. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
Evaluation, Policies, Analytical Hierarchy Process, Quality attributes, SOA Governance |
19 | George Koliadis, Nirmit Desai, Nanjangud C. Narendra, Aditya K. Ghose |
Analyst-Mediated Contextualization of Regulatory Policies. |
IEEE SCC |
2010 |
DBLP DOI BibTeX RDF |
Policies, Business Process, Compliance, Contextualization |
19 | Enrico Scalavino, Vaibhav Gowadia, Rudi Ball, Emil C. Lupu, Giovanni Russello |
Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios. |
POLICY |
2010 |
DBLP DOI BibTeX RDF |
crisis, policies, encryption, data security, opportunistic networks |
19 | Sean X. Zhou, Xiuli Chao, Chung-Yee Lee |
Optimal transportation policies for production/inventory systems with an unreliable and a reliable carrier. |
J. Glob. Optim. |
2009 |
DBLP DOI BibTeX RDF |
Make-to-order, Setup cost, Transportation carrier, Optimal policies, Production/inventory system |
19 | Kostas Tsagkaris, George Dimitrakopoulos 0001, Panagiotis Demestichas |
Policies for the reconfiguration of cognitive wireless infrastructures to 3G Radio Access Technologies. |
Wirel. Networks |
2009 |
DBLP DOI BibTeX RDF |
B3G communications, Demand allocation policies, Multiple carriers, Power-based optimization, Radio Access Technologies (RATs), Reconfigurations, Cognitive networks |
19 | Jee-Hee Koo, Tae-Woong Jung, Mu-Wook Pyeon |
Status of U-city Human Resource Development Business and the Direction for Education Policies. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
Human resource development, Education policies, U-City |
19 | Tugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, Fevzi Belli |
Directed Acyclic Graph Modeling of Security Policies for Firewall Testing. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Firewall Policies, Firewall Testing, Firewalls, Directed Acyclic Graphs, Security Testing, Event Sequence Graphs |
19 | JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu |
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Validation, Access Control Policies, Policy Verification |
Displaying result #401 - #500 of 18116 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|