The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for integrity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1974 (18) 1975-1976 (29) 1977-1978 (25) 1979-1980 (35) 1981-1982 (26) 1983 (23) 1984 (26) 1985 (28) 1986 (20) 1987 (30) 1988 (45) 1989 (44) 1990 (63) 1991 (54) 1992 (65) 1993 (66) 1994 (74) 1995 (90) 1996 (97) 1997 (101) 1998 (134) 1999 (151) 2000 (169) 2001 (228) 2002 (270) 2003 (300) 2004 (409) 2005 (493) 2006 (490) 2007 (565) 2008 (544) 2009 (435) 2010 (224) 2011 (355) 2012 (204) 2013 (221) 2014 (223) 2015 (219) 2016 (260) 2017 (261) 2018 (336) 2019 (339) 2020 (332) 2021 (364) 2022 (315) 2023 (354) 2024 (92)
Publication types (Num. hits)
article(2872) book(14) data(3) incollection(84) inproceedings(6137) phdthesis(123) proceedings(13)
Venues (Conferences, Journals, ...)
CoRR(282) iConference(172) IICIS(118) IEEE Access(91) NeuroImage(68) SIGMOD Conference(66) HILT(62) ACSAC(57) ACM Trans. Database Syst.(55) CCS(55) DAC(55) HICSS(53) ISQED(53) Sci. Eng. Ethics(52) Comput. Secur.(50) DATE(50) More (+10 of total 2584)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5416 occurrences of 2387 keywords

Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19David A. Basin, Kunihiko Miyazaki, Kazuo Takaragi A Formal Analysis of a Digital Signature Architecture. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Elmari Pretorius, Basie von Solms Information Security Governance using ISO 17799 and COBIT. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia A Learning-based Approach to Information Release Control. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Indrajit Ray, Junxing Zhang A Secure Multi-Sited Version Control System. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19William List Role of Certification in Meeting Organisation Security Requirements. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert B. France Using Parameterized UML to Specify and Compose Access Control Models. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Michael Gertz 0001, Erik Guldentops, Leon Strous (eds.) Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Cristina Buchholz The Impact of Web Services on Audit. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Binling Jin, Suzanne M. Embury Increasing the Accuracy of Time-tabled Condition Monitoring. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19David Chadwick Stop that Subversive Spreadsheet! Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Mark Pollitt The Very Brief History of Digital Evidence Standards. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Michael Gertz 0001 Opportunities and Challenges in Tracing Security Breaches. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Grenville J. Croll A Typical Model Audit Approac. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Steffen Jurk, Mira Balaban Towards Effect Preservation of Updates with Loops. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Elmarie Kritzinger-von Solms, Leon Strous Information Security: A Corporate Governance Issue. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Stefano Spaccapietra, Christelle Vangenot, Christine Parent Multi-representation: A New Paradigm for Databases. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Fred de Koning Application Controls in a Client/Server Environment. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Frank Piessens, Bart De Decker, Bart De Win Developing secure software. A survey and classification of common software vulnerabilities. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
19Mike Ward Security in electronic payment systems EMV and CEPs. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
19BartJan Wattel Business process security. Managing the new security challenge with X-Tra Secure. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
19Bhavani Thuraisingham, Eric Hughes Data quality: developments and directions. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
19Naftaly H. Minsky Establishing accounting principles as invariants of financial systems. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
19Alfred C. E. van Gils Implementation of the COBIT-3 maturity model in Royal Philips Electronics. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
19Leon Strous The way forward. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
19Charles Bain, Donald B. Faatz, Amgad Fayad, Douglas E. Williams Diversity as a defense strategy in information systems. Does evidence from previous events support such an approach?. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
19Erik Guldentops Governing information technology through COBIT. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
19Margaret E. van Biene-Hershey, Leon Strous (eds.) Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999 Search on Bibsonomy 1999 DBLP  BibTeX  RDF
19Robert Melville, Michael Hafen Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
19Patrizia Asirelli, Fabrizio Fabbrini Firewall Policies Definition Tools: An Implementation Idea. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
19Christina Yip Chung, Michael Gertz 0001, Karl N. Levitt DEMIDS: A Misuse Detection System for Database Systems. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
19Fayezul H. Choudhury, Philip Mitchell COSO in the Worldbank. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
19Joan L. Aron, Ronald A. Gove Application of Models from Epidemiology to Metrics for Computer Virus Risk - A Brief Update. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
19Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous (eds.) Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998 Search on Bibsonomy 1998 DBLP  BibTeX  RDF
19Marshall D. Abrams, Douglas J. Landoll, Gary Stoneburner Assurance - What is it? Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
19Marcel Korver TOP: An Example of Complex Application Controls. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
19Joan L. Aron, Ronald A. Gove Application of Models from Epidemiology to Metrics for Computer Virus Risk. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
19Margaret E. van Biene-Hershey Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-Auditors. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
19Giovanni Rumolo, Sushil Jajodia Algebra for Databases with Explicit Markings of Damaged Data. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
19Patrizia Asirelli, Chiara Renso, Franco Turini The Constraint Operator of MedLan: Its Efficient Implementation and Use. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
19Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous (eds.) Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997 Search on Bibsonomy 1997 DBLP  BibTeX  RDF
19Naftaly H. Minsky Towards Continuously Auditable Systems. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
19Erik Guldentops Establishing an Information Security Strategy. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
19Michael Gertz 0001, Udo W. Lipeck An Extensible Framework for Repairing Constraint Violations. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
19Michael Gertz 0001, Udo W. Lipeck Deriving Optimized Integrity Monitoring Triggers from Dynamic Integrity Constraints. Search on Bibsonomy Data Knowl. Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
19Patrizia Asirelli, Paola Inverardi, Giuseppe Plagenza Integrity Constraints as Views in Deductice Databases. Search on Bibsonomy FMLDO The full citation details ... 1996 DBLP  BibTeX  RDF
19Suzanne M. Embury Coping with Constraint Violation: the Practical Face of Database Integrity. Search on Bibsonomy FMLDO The full citation details ... 1996 DBLP  BibTeX  RDF
19Robert Demolombe, Andrew J. I. Jones, José Carmo Towards a Uniform Logical Representation of Different Kinds of Integrity Constraints. Search on Bibsonomy FMLDO The full citation details ... 1996 DBLP  BibTeX  RDF
19Anne Doucet, Stéphane Gançarski, Geneviève Jomier, Sophie Monties Integrity Constraints and Versions. Search on Bibsonomy FMLDO The full citation details ... 1996 DBLP  BibTeX  RDF
19Antoon Bosselaers, Bart Preneel (eds.) Integrity Primitives for Secure Information Systems, Final Report of RACE Integrity Primitives Evaluation RIPE-RACE 1040 Search on Bibsonomy 1995   DOI  RDF
19Hirofumi Katsuno Two Classes of Easily Tested Integrity Constraints: Complacent and FD-complacent Integrity Constraints. Search on Bibsonomy FODO The full citation details ... 1985 DBLP  BibTeX  RDF
19Gilles M. E. Lafue Semantic Integrity Dependencies and Delayed Integrity Checking. Search on Bibsonomy VLDB The full citation details ... 1982 DBLP  BibTeX  RDF
15Michael Stepp, Beth Simon Introductory computing students' conceptions of illegal student-student collaboration. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF academic integrity, cs1, cheating, plagiarism
15Junxia Ma, Jeremy Lee, Mohammad Tehranipoor, Nisar Ahmed, Patrick Girard 0001 Pattern grading for testing critical paths considering power supply noise and crosstalk using a layout-aware quality metric. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF pattern grading, crosstalk, signal integrity, power supply noise, path delay test
15C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia Dynamic provable data possession. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authenticated data structures, outsourced storage, proof of retrievability, provable data possession, authentication, skip list, integrity checking
15Guoxing Zhan, Weisong Shi, Hongmei Julia Deng SensorTrust: a resilient trust model for WSNs. Search on Bibsonomy SenSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hierarchical WSNs, trust, data integrity
15Martin Op't Land, Hans Zwitzer, Paul Ensink, Quentin Lebel Towards a fast enterprise ontology based method for post merger integration. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF merging IT systems, merging organizations, migration issues, operational integrity, post merger integration, return on modeling effort, enterprise networks, DEMO, enterprise ontology, PMI
15Jens Braband, Rüdiger vom Hövel, Hendrik Schäbe Probability of Failure on Demand - The Why and the How. Search on Bibsonomy SAFECOMP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Probability of failure on demand, rate of dangerous failures, safety integrity level
15Yue Li 0013, Chang-Tsun Li Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PRNU noise pattern, source device identification, Digital forensics, integrity verification
15Chang-Tsun Li, Yue Li 0013 Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Medical image authentication, digital watermarking, data hiding, digital forensics, integrity verification
15Giuseppe Pelagatti, Mauro Negri, Alberto Belussi, Sara Migliorini From the conceptual design of spatial constraints to their implementation in real systems. Search on Bibsonomy GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF spatial data validation, spatial integrity constraints, conceptual modeling
15Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, verification, integrity, secret sharing, outsource, Aggregate query
15Robert A. Kowalski, Fariba Sadri Integrating Logic Programming and Production Systems in Abductive Logic Programming Agents. Search on Bibsonomy RR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Abductive logic programming, agents, Integrity constraints, Production systems
15Leona F. Fass An ethnocentric look at the law and technology interface. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Technology policy, barriers to access, engineering ethics, ethnocentric software engineering, human-web interaction, security, privacy, information integrity, computing environments
15Yunhua Koglin, Danfeng Yao, Elisa Bertino Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Distributed systems, Data sharing, Database Management, integrity and protection
15Renzo Angles, Claudio Gutierrez 0001 Survey of graph database models. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF graph database models, graph integrity constraints, graph query languages, Database systems, graph databases, database models
15Christoph Heller, Josef Schalk, Stefan Schneele, Reinhard Reichel Approaching the Limits of FlexRay. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF signal integrity criteria, topology assessment, FlexRay, physical layer, aeronautic
15Yin Hu, Ghaith Hammouri, Berk Sunar A fast real-time memory authentication protocol. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fast authentication, memory integrity, universal hash
15Haowen Chan, Adrian Perrig Efficient security primitives derived from a secure aggregation algorithm. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF public key management, sensor networks, authentication, integrity, broadcast, signatures, data aggregation
15Frederic Stumpf, Andreas Fuchs 0002, Stefan Katzenbeisser 0001, Claudia Eckert 0001 Improving the scalability of platform attestation. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attestation protocols, integrity reporting, performance, scalability, trusted computing, remote attestation
15Richard P. Gabriel Designed as designer. Search on Bibsonomy OOPSLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF conceptual integrity, design
15Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Context-Awareness, Integrity, Confidentiality, Mandatory Access Control
15Cédric Fournet, Tamara Rezk Cryptographically sound implementations for typed information-flow security. Search on Bibsonomy POPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF probabilistic programs, cryptography, compilers, integrity, type systems, computational model, confidentiality, non-interference, secure information flow
15Kazuhiro Minami, Adam J. Lee, Marianne Winslett, Nikita Borisov Secure aggregation in a publish-subscribe system. Search on Bibsonomy WPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integrity, aggregation, data privacy, publish-subscribe system
15Ding Chen, Chee Yong Chan Minimization of tree pattern queries with constraints. Search on Bibsonomy SIGMOD Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF query minimization, tree pattern queries, simulation, xpath, xml, integrity constraints, chase
15Moritoshi Yasunaga, Yoshiki Yamaguchi, Hiroshi Nakayama, Ikuo Yoshihara, Naoki Koizumi, Jung Hwan Kim The Segmental-Transmission-Line: Its Design and Prototype Evaluation. Search on Bibsonomy ICES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Evolutionary Hardware Design, Signal Integrity, Transmission Line, Printed Circuit Board
15Toshikazu Uemura, Tadashi Dohi Optimizing Security Measures in an Intrusion Tolerant Database System. Search on Bibsonomy ISAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ITDB, dependable and secure service, rewarding availability, optimization, survivability, system integrity, semi-Markov models
15Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. Search on Bibsonomy CoNEXT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integrity protection, authentication, hash chains
15Scott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang 0001 Trustworthy and personalized computing on public kiosks. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF kiosk computing, mobility, virtualization, personalized computing, trusted platform module, integrity verification
15David Champagne, Reouven Elbaz, Ruby B. Lee The Reduced Address Space (RAS) for Application Memory Authentication. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Memory authentication, integrity tree, secure computing architecture
15Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integrity of images protection, adaptive median filter, tampered detection and recovery, discrete cosine transform, Semi-fragile watermarking
15Esmiralda Moradian Integrating Web Services and Intelligent Agents in Supply Chain for Securing Sensitive Messages. Search on Bibsonomy KES (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integrity, monitoring, intelligent agents, availability, Information security, confidentiality, meta-agents
15Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i
15Zhen Mu Power Delivery System: Sufficiency, Efficiency, and Stability. Search on Bibsonomy ISQED The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Power Integrity (PI), power delivery system (PDS), Chip-Package-Board Co-design
15James D'Arcy Walsh, Francis Bordeleau, Bran Selic Domain analysis of dynamic system reconfiguration. Search on Bibsonomy Softw. Syst. Model. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF based systems, driven development, Model-, UML, Component, Software evolution, Dynamic reconfiguration, System integrity, Feature modeling, Alloy
15Karim Arabi, Resve A. Saleh, Xiongfei Meng Power Supply Noise in SoCs: Metrics, Management, and Measurement. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF metrics, DFT, power supply noise, deep-submicron, production test, power integrity
15Jon Heggland Foreign Superkeys and Constant References. Search on Bibsonomy IDEAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Relational theory, entity subclassing, foreign keys, integrity constraints
15Bogdan Cautis, Serge Abiteboul, Tova Milo Reasoning about XML update constraints. Search on Bibsonomy PODS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF update constraints, XML, data integrity, semi-structured data, implication
15Lei Xia, Wei Huang, Hao Huang A Compositional Multiple Policies Operating System Security Model. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege
15Subhasish Mitra, Pia N. Sanda, Norbert Seifert Soft Errors: Technology Trends, System Effects, and Protection Techniques. Search on Bibsonomy IOLTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Memory soft errors, Logic soft errors, timing derating, logic derating, architectural derating, Built-In Soft Error Resilience, reliability, data integrity, availability, Error Correcting Codes, error detection, recovery, Soft errors, FITs, radiation hardening
15Eun-A Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim 0001 Efficient an Implementation Method Research of a Smart Card Atomic Operation. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Card Operating System (COS), Data integrity, Atomic operation
15Frédéric Gervais, Marc Frappier, Régine Laleau Refinement of eb3 Process Patterns into B Specifications. Search on Bibsonomy B The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data integrity constraints, eb3, process expressions, Information systems, refinement
15Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Chun, John Kubiatowicz Antiquity: exploiting a secure log for wide-area distributed storage. Search on Bibsonomy EuroSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF archival storage systems, data durability, data integrity, distributed storage system, wide-area
15Nico Janssens, Eddy Truyen, Frans Sanen, Wouter Joosen Adding dynamic reconfiguration support to JBoss AOP. Search on Bibsonomy MAI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF aspect-oriented middleware, dynamic distributed aspect weaving, dynamic reconfiguration of distributed systems, global state consistency, structural integrity
15Baik Hoh, Marco Gruteser, Hui Xiong 0001, Ansaf Alrabady Enhancing Security and Privacy in Traffic-Monitoring Systems. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF traffic monitoring systems, security, clustering, privacy, data integrity
15C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF financial fraud, Data integrity, Security architecture, Insider threats
15Jordi Cabot, Ernest Teniente Transforming OCL constraints: a context change approach. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF context change, transformation, OCL, integrity constraint
15Giovanni Di Crescenzo, Faramak Vakil Cryptographic hashing for virus localization. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic hashing, virus tolerance, integrity verification, virus detection
15Chen-Wei Liu, Yao-Wen Chang Floorplan and power/ground network co-synthesis for fast design convergence. Search on Bibsonomy ISPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF power/ground analysis, simulated annealing, floorplanning, IR drop, power integrity
15Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski Kleptographic Attacks on E-Voting Schemes. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF receipt voting, election integrity, verifiable pseudo-randomness, electronic voting, coercion, kleptography
15Marco Brambilla 0001, Jordi Cabot Constraint tuning and management for web applications. Search on Bibsonomy ICWE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF web application, integrity constraints, tuning
Displaying result #601 - #700 of 9246 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license