Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | David A. Basin, Kunihiko Miyazaki, Kazuo Takaragi |
A Formal Analysis of a Digital Signature Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 31-47, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Elmari Pretorius, Basie von Solms |
Information Security Governance using ISO 17799 and COBIT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 107-113, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia |
A Learning-based Approach to Information Release Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 83-105, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Indrajit Ray, Junxing Zhang |
A Secure Multi-Sited Version Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 125-141, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | William List |
Role of Certification in Meeting Organisation Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 241-248, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert B. France |
Using Parameterized UML to Specify and Compose Access Control Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, pp. 49-65, 2003, Springer, 978-1-4020-7900-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Michael Gertz 0001, Erik Guldentops, Leon Strous (eds.) |
Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![Kluwer, 1-4020-7005-5 The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Cristina Buchholz |
The Impact of Web Services on Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 151-172, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Binling Jin, Suzanne M. Embury |
Increasing the Accuracy of Time-tabled Condition Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 21-35, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | David Chadwick |
Stop that Subversive Spreadsheet! ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 205-211, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Mark Pollitt |
The Very Brief History of Digital Evidence Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 135-143, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Michael Gertz 0001 |
Opportunities and Challenges in Tracing Security Breaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 223-226, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Grenville J. Croll |
A Typical Model Audit Approac. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 213-219, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Steffen Jurk, Mira Balaban |
Towards Effect Preservation of Updates with Loops. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 59-75, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Elmarie Kritzinger-von Solms, Leon Strous |
Information Security: A Corporate Governance Issue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 115-133, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Stefano Spaccapietra, Christelle Vangenot, Christine Parent |
Multi-representation: A New Paradigm for Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 143-149, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Fred de Koning |
Application Controls in a Client/Server Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany, pp. 77-97, 2002, Kluwer, 1-4020-7473-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Frank Piessens, Bart De Decker, Bart De Win |
Developing secure software. A survey and classification of common software vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 27-40, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
19 | Mike Ward |
Security in electronic payment systems EMV and CEPs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 103-112, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
19 | BartJan Wattel |
Business process security. Managing the new security challenge with X-Tra Secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 177-186, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
19 | Bhavani Thuraisingham, Eric Hughes |
Data quality: developments and directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 97-102, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
19 | Naftaly H. Minsky |
Establishing accounting principles as invariants of financial systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 41-56, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
19 | Alfred C. E. van Gils |
Implementation of the COBIT-3 maturity model in Royal Philips Electronics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 161-174, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
19 | Leon Strous |
The way forward. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 197-200, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
19 | Charles Bain, Donald B. Faatz, Amgad Fayad, Douglas E. Williams |
Diversity as a defense strategy in information systems. Does evidence from previous events support such an approach?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 77-94, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
19 | Erik Guldentops |
Governing information technology through COBIT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium, pp. 115-160, 2001, Kluwer, 1-4020-7005-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
19 | Margaret E. van Biene-Hershey, Leon Strous (eds.) |
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999 ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
1999 |
DBLP BibTeX RDF |
|
19 | Robert Melville, Michael Hafen |
Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 11-22, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
19 | Patrizia Asirelli, Fabrizio Fabbrini |
Firewall Policies Definition Tools: An Implementation Idea. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 99-110, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
19 | Christina Yip Chung, Michael Gertz 0001, Karl N. Levitt |
DEMIDS: A Misuse Detection System for Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 159-178, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
19 | Fayezul H. Choudhury, Philip Mitchell |
COSO in the Worldbank. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 1-10, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
19 | Joan L. Aron, Ronald A. Gove |
Application of Models from Epidemiology to Metrics for Computer Virus Risk - A Brief Update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999, pp. 179-184, 1999, Kluwer, 0-7923-7821-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
19 | Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous (eds.) |
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998 ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
1998 |
DBLP BibTeX RDF |
|
19 | Marshall D. Abrams, Douglas J. Landoll, Gary Stoneburner |
Assurance - What is it? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 271-284, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
19 | Marcel Korver |
TOP: An Example of Complex Application Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 75-101, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
19 | Joan L. Aron, Ronald A. Gove |
Application of Models from Epidemiology to Metrics for Computer Virus Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 131-145, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
19 | Margaret E. van Biene-Hershey |
Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-Auditors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 57-74, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
19 | Giovanni Rumolo, Sushil Jajodia |
Algebra for Databases with Explicit Markings of Damaged Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 103-129, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
19 | Patrizia Asirelli, Chiara Renso, Franco Turini |
The Constraint Operator of MedLan: Its Efficient Implementation and Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998, pp. 41-55, 1998, Kluwer, 0-412-84770-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
19 | Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous (eds.) |
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997 ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
1997 |
DBLP BibTeX RDF |
|
19 | Naftaly H. Minsky |
Towards Continuously Auditable Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 23-41, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
19 | Erik Guldentops |
Establishing an Information Security Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 1-21, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
19 | Michael Gertz 0001, Udo W. Lipeck |
An Extensible Framework for Repairing Constraint Violations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICIS ![In: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997, pp. 89-111, 1997, Chapman Hall, 0-412-82600-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
19 | Michael Gertz 0001, Udo W. Lipeck |
Deriving Optimized Integrity Monitoring Triggers from Dynamic Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Knowl. Eng. ![In: Data Knowl. Eng. 20(2), pp. 163-193, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
19 | Patrizia Asirelli, Paola Inverardi, Giuseppe Plagenza |
Integrity Constraints as Views in Deductice Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMLDO ![In: Integrity in Databases - 6th International Workshop on Foundations of Models and Languages for Data and Objects, Schloss Dagstuhl, Germany, September 16-20, 1996, Proceedings, pp. 133-140, 1996, University of Magedeburg, Faculty of Computer Science. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
19 | Suzanne M. Embury |
Coping with Constraint Violation: the Practical Face of Database Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMLDO ![In: Integrity in Databases - 6th International Workshop on Foundations of Models and Languages for Data and Objects, Schloss Dagstuhl, Germany, September 16-20, 1996, Proceedings, pp. 141-148, 1996, University of Magedeburg, Faculty of Computer Science. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
19 | Robert Demolombe, Andrew J. I. Jones, José Carmo |
Towards a Uniform Logical Representation of Different Kinds of Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMLDO ![In: Integrity in Databases - 6th International Workshop on Foundations of Models and Languages for Data and Objects, Schloss Dagstuhl, Germany, September 16-20, 1996, Proceedings, pp. 157-164, 1996, University of Magedeburg, Faculty of Computer Science. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
19 | Anne Doucet, Stéphane Gançarski, Geneviève Jomier, Sophie Monties |
Integrity Constraints and Versions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMLDO ![In: Integrity in Databases - 6th International Workshop on Foundations of Models and Languages for Data and Objects, Schloss Dagstuhl, Germany, September 16-20, 1996, Proceedings, pp. 25-39, 1996, University of Magedeburg, Faculty of Computer Science. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
19 | Antoon Bosselaers, Bart Preneel (eds.) |
Integrity Primitives for Secure Information Systems, Final Report of RACE Integrity Primitives Evaluation RIPE-RACE 1040 ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
1995 |
DOI RDF |
|
19 | Hirofumi Katsuno |
Two Classes of Easily Tested Integrity Constraints: Complacent and FD-complacent Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FODO ![In: Foundations of Data Organization, Proceedings of the International Conference on Foundations of Data Organization, May 22-24, 1985, Kyoto, Japan., pp. 563-576, 1985, Plemum Press, New York, 0-306-42567-X. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP BibTeX RDF |
|
19 | Gilles M. E. Lafue |
Semantic Integrity Dependencies and Delayed Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB ![In: Eigth International Conference on Very Large Data Bases, September 8-10, 1982, Mexico City, Mexico, Proceedings, pp. 292-299, 1982, Morgan Kaufmann, 0-934613-14-1. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP BibTeX RDF |
|
15 | Michael Stepp, Beth Simon |
Introductory computing students' conceptions of illegal student-student collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 295-299, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
academic integrity, cs1, cheating, plagiarism |
15 | Junxia Ma, Jeremy Lee, Mohammad Tehranipoor, Nisar Ahmed, Patrick Girard 0001 |
Pattern grading for testing critical paths considering power supply noise and crosstalk using a layout-aware quality metric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 20th ACM Great Lakes Symposium on VLSI 2009, Providence, Rhode Island, USA, May 16-18 2010, pp. 127-130, 2010, ACM, 978-1-4503-0012-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
pattern grading, crosstalk, signal integrity, power supply noise, path delay test |
15 | C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia |
Dynamic provable data possession. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 213-222, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authenticated data structures, outsourced storage, proof of retrievability, provable data possession, authentication, skip list, integrity checking |
15 | Guoxing Zhan, Weisong Shi, Hongmei Julia Deng |
SensorTrust: a resilient trust model for WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SenSys ![In: Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, SenSys 2009, Berkeley, California, USA, November 4-6, 2009, pp. 411-412, 2009, ACM, 978-1-60558-519-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hierarchical WSNs, trust, data integrity |
15 | Martin Op't Land, Hans Zwitzer, Paul Ensink, Quentin Lebel |
Towards a fast enterprise ontology based method for post merger integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 245-252, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
merging IT systems, merging organizations, migration issues, operational integrity, post merger integration, return on modeling effort, enterprise networks, DEMO, enterprise ontology, PMI |
15 | Jens Braband, Rüdiger vom Hövel, Hendrik Schäbe |
Probability of Failure on Demand - The Why and the How. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings, pp. 46-54, 2009, Springer, 978-3-642-04467-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Probability of failure on demand, rate of dangerous failures, safety integrity level |
15 | Yue Li 0013, Chang-Tsun Li |
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 166-172, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
PRNU noise pattern, source device identification, Digital forensics, integrity verification |
15 | Chang-Tsun Li, Yue Li 0013 |
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 153-159, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Medical image authentication, digital watermarking, data hiding, digital forensics, integrity verification |
15 | Giuseppe Pelagatti, Mauro Negri, Alberto Belussi, Sara Migliorini |
From the conceptual design of spatial constraints to their implementation in real systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2009, November 4-6, 2009, Seattle, Washington, USA, Proceedings, pp. 448-451, 2009, ACM, 978-1-60558-649-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
spatial data validation, spatial integrity constraints, conceptual modeling |
15 | Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao |
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 185-201, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, verification, integrity, secret sharing, outsource, Aggregate query |
15 | Robert A. Kowalski, Fariba Sadri |
Integrating Logic Programming and Production Systems in Abductive Logic Programming Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RR ![In: Web Reasoning and Rule Systems, Third International Conference, RR 2009, Chantilly, VA, USA, October 25-26, 2009, Proceedings, pp. 1-23, 2009, Springer, 978-3-642-05081-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Abductive logic programming, agents, Integrity constraints, Production systems |
15 | Leona F. Fass |
An ethnocentric look at the law and technology interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 33(1), 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Technology policy, barriers to access, engineering ethics, ethnocentric software engineering, human-web interaction, security, privacy, information integrity, computing environments |
15 | Yunhua Koglin, Danfeng Yao, Elisa Bertino |
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 19(5), pp. 615-626, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Distributed systems, Data sharing, Database Management, integrity and protection |
15 | Renzo Angles, Claudio Gutierrez 0001 |
Survey of graph database models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 40(1), pp. 1:1-1:39, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
graph database models, graph integrity constraints, graph query languages, Database systems, graph databases, database models |
15 | Christoph Heller, Josef Schalk, Stefan Schneele, Reinhard Reichel |
Approaching the Limits of FlexRay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, NCA 2008, July 10-12, 2008, Cambridge, Massachusetts, USA, pp. 205-210, 2008, IEEE Computer Society, 978-0-7695-3192-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
signal integrity criteria, topology assessment, FlexRay, physical layer, aeronautic |
15 | Yin Hu, Ghaith Hammouri, Berk Sunar |
A fast real-time memory authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 31-40, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fast authentication, memory integrity, universal hash |
15 | Haowen Chan, Adrian Perrig |
Efficient security primitives derived from a secure aggregation algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 521-534, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
public key management, sensor networks, authentication, integrity, broadcast, signatures, data aggregation |
15 | Frederic Stumpf, Andreas Fuchs 0002, Stefan Katzenbeisser 0001, Claudia Eckert 0001 |
Improving the scalability of platform attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 1-10, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
attestation protocols, integrity reporting, performance, scalability, trusted computing, remote attestation |
15 | Richard P. Gabriel |
Designed as designer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2008, October 19-23, 2008, Nashville, TN, USA, pp. 617-632, 2008, ACM, 978-1-60558-215-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
conceptual integrity, design |
15 | Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili |
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings, pp. 401-414, 2008, Springer, 978-3-540-87697-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Context-Awareness, Integrity, Confidentiality, Mandatory Access Control |
15 | Cédric Fournet, Tamara Rezk |
Cryptographically sound implementations for typed information-flow security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, pp. 323-335, 2008, ACM, 978-1-59593-689-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
probabilistic programs, cryptography, compilers, integrity, type systems, computational model, confidentiality, non-interference, secure information flow |
15 | Kazuhiro Minami, Adam J. Lee, Marianne Winslett, Nikita Borisov |
Secure aggregation in a publish-subscribe system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 95-104, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integrity, aggregation, data privacy, publish-subscribe system |
15 | Ding Chen, Chee Yong Chan |
Minimization of tree pattern queries with constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 609-622, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
query minimization, tree pattern queries, simulation, xpath, xml, integrity constraints, chase |
15 | Moritoshi Yasunaga, Yoshiki Yamaguchi, Hiroshi Nakayama, Ikuo Yoshihara, Naoki Koizumi, Jung Hwan Kim |
The Segmental-Transmission-Line: Its Design and Prototype Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICES ![In: Evolvable Systems: From Biology to Hardware, 8th International Conference, ICES 2008, Prague, Czech Republic, September 21-24, 2008. Proceedings, pp. 130-140, 2008, Springer, 978-3-540-85856-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Evolutionary Hardware Design, Signal Integrity, Transmission Line, Printed Circuit Board |
15 | Toshikazu Uemura, Tadashi Dohi |
Optimizing Security Measures in an Intrusion Tolerant Database System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAS ![In: Service Availability, 5th International Service Availability Symposium, ISAS 2008, Tokyo, Japan, May 19-21, 2008, Proceedings, pp. 26-42, 2008, Springer, 978-3-540-68128-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ITDB, dependable and secure service, rewarding availability, optimization, survivability, system integrity, semi-Markov models |
15 | Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle |
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008, pp. 23, 2008, ACM, 978-1-60558-210-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integrity protection, authentication, hash chains |
15 | Scott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang 0001 |
Trustworthy and personalized computing on public kiosks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), Breckenridge, CO, USA, June 17-20, 2008, pp. 199-210, 2008, ACM, 978-1-60558-139-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
kiosk computing, mobility, virtualization, personalized computing, trusted platform module, integrity verification |
15 | David Champagne, Reouven Elbaz, Ruby B. Lee |
The Reduced Address Space (RAS) for Application Memory Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 47-63, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Memory authentication, integrity tree, secure computing architecture |
15 | Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang |
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 629-640, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integrity of images protection, adaptive median filter, tampered detection and recovery, discrete cosine transform, Semi-fragile watermarking |
15 | Esmiralda Moradian |
Integrating Web Services and Intelligent Agents in Supply Chain for Securing Sensitive Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part III, pp. 771-778, 2008, Springer, 978-3-540-85566-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integrity, monitoring, intelligent agents, availability, Information security, confidentiality, meta-agents |
15 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 307-311, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
15 | Zhen Mu |
Power Delivery System: Sufficiency, Efficiency, and Stability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 9th International Symposium on Quality of Electronic Design (ISQED 2008), 17-19 March 2008, San Jose, CA, USA, pp. 465-469, 2008, IEEE Computer Society, 978-0-7695-3117-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Power Integrity (PI), power delivery system (PDS), Chip-Package-Board Co-design |
15 | James D'Arcy Walsh, Francis Bordeleau, Bran Selic |
Domain analysis of dynamic system reconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Syst. Model. ![In: Softw. Syst. Model. 6(4), pp. 355-380, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
based systems, driven development, Model-, UML, Component, Software evolution, Dynamic reconfiguration, System integrity, Feature modeling, Alloy |
15 | Karim Arabi, Resve A. Saleh, Xiongfei Meng |
Power Supply Noise in SoCs: Metrics, Management, and Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Des. Test Comput. ![In: IEEE Des. Test Comput. 24(3), pp. 236-244, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
metrics, DFT, power supply noise, deep-submicron, production test, power integrity |
15 | Jon Heggland |
Foreign Superkeys and Constant References. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: Eleventh International Database Engineering and Applications Symposium (IDEAS 2007), September 6-8, 2007, Banff, Alberta, Canada, pp. 149-153, 2007, IEEE Computer Society, 0-7695-2947-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Relational theory, entity subclassing, foreign keys, integrity constraints |
15 | Bogdan Cautis, Serge Abiteboul, Tova Milo |
Reasoning about XML update constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Sixth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 11-13, 2007, Beijing, China, pp. 195-204, 2007, ACM, 978-1-59593-685-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
update constraints, XML, data integrity, semi-structured data, implication |
15 | Lei Xia, Wei Huang, Hao Huang |
A Compositional Multiple Policies Operating System Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 291-302, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege |
15 | Subhasish Mitra, Pia N. Sanda, Norbert Seifert |
Soft Errors: Technology Trends, System Effects, and Protection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOLTS ![In: 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 8-11 July 2007, Heraklion, Crete, Greece, pp. 4, 2007, IEEE Computer Society, 0-7695-2918-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Memory soft errors, Logic soft errors, timing derating, logic derating, architectural derating, Built-In Soft Error Resilience, reliability, data integrity, availability, Error Correcting Codes, error detection, recovery, Soft errors, FITs, radiation hardening |
15 | Eun-A Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim 0001 |
Efficient an Implementation Method Research of a Smart Card Atomic Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 113-121, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Card Operating System (COS), Data integrity, Atomic operation |
15 | Frédéric Gervais, Marc Frappier, Régine Laleau |
Refinement of eb3 Process Patterns into B Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
B ![In: B 2007: Formal Specification and Development in B, 7th International Conference of B Users, Besançon, France, January 17-19, 2007, Proceedings, pp. 201-215, 2007, Springer, 3-540-68760-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
data integrity constraints, eb3, process expressions, Information systems, refinement |
15 | Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Chun, John Kubiatowicz |
Antiquity: exploiting a secure log for wide-area distributed storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, pp. 371-384, 2007, ACM, 978-1-59593-636-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
archival storage systems, data durability, data integrity, distributed storage system, wide-area |
15 | Nico Janssens, Eddy Truyen, Frans Sanen, Wouter Joosen |
Adding dynamic reconfiguration support to JBoss AOP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MAI ![In: Proceedings of the 1st Workshop on Middleware-Application Interaction, MAI 2007, in conjunction with Euro-Sys 2007, Lisbon, Portugal, March 20, 2007, pp. 1-8, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
aspect-oriented middleware, dynamic distributed aspect weaving, dynamic reconfiguration of distributed systems, global state consistency, structural integrity |
15 | Baik Hoh, Marco Gruteser, Hui Xiong 0001, Ansaf Alrabady |
Enhancing Security and Privacy in Traffic-Monitoring Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 5(4), pp. 38-46, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
traffic monitoring systems, security, clustering, privacy, data integrity |
15 | C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter |
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 36-51, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
financial fraud, Data integrity, Security architecture, Insider threats |
15 | Jordi Cabot, Ernest Teniente |
Transforming OCL constraints: a context change approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1196-1201, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
context change, transformation, OCL, integrity constraint |
15 | Giovanni Di Crescenzo, Faramak Vakil |
Cryptographic hashing for virus localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006, pp. 41-48, 2006, ACM Press, 1-59593-551-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptographic hashing, virus tolerance, integrity verification, virus detection |
15 | Chen-Wei Liu, Yao-Wen Chang |
Floorplan and power/ground network co-synthesis for fast design convergence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPD ![In: Proceedings of the 2006 International Symposium on Physical Design, ISPD 2006, San Jose, California, USA, April 9-12, 2006, pp. 86-93, 2006, ACM, 1-59593-299-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
power/ground analysis, simulated annealing, floorplanning, IR drop, power integrity |
15 | Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski |
Kleptographic Attacks on E-Voting Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 494-508, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
receipt voting, election integrity, verifiable pseudo-randomness, electronic voting, coercion, kleptography |
15 | Marco Brambilla 0001, Jordi Cabot |
Constraint tuning and management for web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWE ![In: Proceedings of the 6th International Conference on Web Engineering, ICWE 2006, Palo Alto, California, USA, July 11-14, 2006, pp. 345-352, 2006, ACM, 1-59593-352-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
web application, integrity constraints, tuning |