|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Qingfeng Chen, Chengqi Zhang, Shichao Zhang 0001 |
ENDL: A Logical Framework for Verifying Secure Transaction Protocols. |
Knowl. Inf. Syst. |
2005 |
DBLP DOI BibTeX RDF |
Secure transaction protocol, Security, Verification, Integrity, Electronic commerce, Confidentiality |
15 | Pedro Cano, Eloi Batlle, Ton Kalker, Jaap Haitsma |
A Review of Audio Fingerprinting. |
J. VLSI Signal Process. |
2005 |
DBLP DOI BibTeX RDF |
content-based audio identification, audio information retrieval, watermarking, integrity verification, audio fingerprinting, robust hashing |
15 | Daniele Rossi 0001, André K. Nieuwland, Atul Katoch, Cecilia Metra |
New ECC for Crosstalk Impact Minimization. |
IEEE Des. Test Comput. |
2005 |
DBLP DOI BibTeX RDF |
Fault Tolerance, Reliability, Error Correcting Codes, Crosstalk, Signal Integrity |
15 | Reagan W. Moore, Richard Marciano |
Building preservation environments. |
JCDL |
2005 |
DBLP DOI BibTeX RDF |
infrastructure independence, persistent archives, authenticity, integrity |
15 | Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia |
Indexing Information for Data Forensics. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
data forensics, data marking, combinatorial group testing, data structures, data integrity, information hiding, tamper detection |
15 | Cristiano Forzan, Davide Pandini |
A complete methodology for an accurate static noise analysis. |
ACM Great Lakes Symposium on VLSI |
2005 |
DBLP DOI BibTeX RDF |
noise propagation, crosstalk, signal integrity |
15 | Junhu Wang |
A Comparative Study of Functional Dependencies for XML. |
APWeb |
2005 |
DBLP DOI BibTeX RDF |
XML tree, scheme file, Data integrity, functional dependency |
15 | Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka |
PIATS: A Partially Sanitizable Signature Scheme. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Sanitizable signature scheme, partial integrity, privacy |
15 | Li Xiao 0001, Xiaodong Zhang 0001, Artur Andrzejak 0001, Songqing Chen |
Building a Large and Efficient Hybrid Peer-to-Peer Internet Caching System. |
IEEE Trans. Knowl. Data Eng. |
2004 |
DBLP DOI BibTeX RDF |
browser caching, communication anonymity, data integrity, peer-to-peer systems, proxy caching, Internet systems |
15 | Xiaocheng Ge, Fiona Polack, Régine Laleau |
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment. |
CAiSE |
2004 |
DBLP DOI BibTeX RDF |
access control, Databases, data integrity, security models, development methods |
15 | Yingjiu Li, Huiping Guo, Sushil Jajodia |
Tamper detection and localization for categorical data using fragile watermarks. |
Digital Rights Management Workshop |
2004 |
DBLP DOI BibTeX RDF |
integrity, database security, fragile watermarking |
15 | Peter Buneman, Wenfei Fan, Scott Weinstein |
Interaction between path and type constraints. |
ACM Trans. Comput. Log. |
2003 |
DBLP DOI BibTeX RDF |
types, integrity constraints, semistructured data, implication |
15 | Ira Acharya, Hemendra Kumar Singh |
Testing of 3G 1xEV-DV Stack - A Case Study. |
TestCom |
2003 |
DBLP DOI BibTeX RDF |
testing challenges, IUT, 1xEV-DV, EV-DV, DV, reference implementation, 3GPP2, LAC, RLP, L2, L3, packet data channel, PDCHCF, Message Integrity, simulation, Testing, MAC, queues, behavior, task, video conferencing, SDL, formalism, 3G, Signaling, logging, conformance, test automation, formal description techniques, MSC, timers, protocol stack, test scripts, TTCN |
15 | Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao |
A flexible and scalable authentication scheme for JPEG2000 image codestreams. |
ACM Multimedia |
2003 |
DBLP DOI BibTeX RDF |
message digest, authentication, data integrity, digital signature, image compression, JPEG2000, one-way hash function, merkle hash tree |
15 | Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari |
An infrastructure for managing secure update operations on XML data. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
distributed updates, integrity check protocols, XML |
15 | Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers |
Secure program partitioning. |
ACM Trans. Comput. Syst. |
2002 |
DBLP DOI BibTeX RDF |
mutual distrust, distributed systems, integrity, type systems, security policies, Confidentiality, secrecy, declassification, downgrading |
15 | Martin S. Olivier |
Database Privacy. |
SIGKDD Explor. |
2002 |
DBLP DOI BibTeX RDF |
dataveillance, integrity, availability, confidentiality, personal data, database privacy |
15 | Michael P. Evans, Steven Furnell |
A web-based resource migration protocol using WebDAV. |
WWW |
2002 |
DBLP DOI BibTeX RDF |
link rot, resource locator service, resource migration protocol, web, WebDAV, referential integrity |
15 | Naren Kodali, Duminda Wijesekera |
Regulating access to SMIL formatted pay-per-view movies. |
XML Security |
2002 |
DBLP DOI BibTeX RDF |
synchronized multimedia, XML, access control, integrity, encryption, smart card, SMIL, pay-per-view |
15 | April Kwong, Michael Gertz 0001 |
Authentic Publication of XML Document Data. |
WISE (1) |
2001 |
DBLP DOI BibTeX RDF |
authentic data publication, XML, data integrity |
15 | Andrew C. Myers, Barbara Liskov |
Protecting privacy using the decentralized label model. |
ACM Trans. Softw. Eng. Methodol. |
2000 |
DBLP DOI BibTeX RDF |
principals, integrity, policies, lattice, confidentiality, roles, type checking, information flow controls, declassification, end-to-end, downgrading |
15 | Rolly Intan, Masao Mukaidono |
Fuzzy Functional Dependency and Its Application to Approximate Data Querying. |
IDEAS |
2000 |
DBLP DOI BibTeX RDF |
partial fuzzy functional dependency, approximate data querying, approximate data reduction, fuzzy integrity constraints, fuzzy query relations, extended query system, relational databases, projection, fuzzy set theory, conditional probability, approximate joins |
15 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
15 | Ann Q. Gates, Patricia J. Teller |
DynaMICs: An Automated and Independent Software-FaultDetection Approach. |
HASE |
1999 |
DBLP DOI BibTeX RDF |
software-fault detection, software-fault monitoring, hardware-assisted monitoring, constraints, tracing, integrity constraints, verification and validation |
15 | Bert O. de Brock |
Declarative Specifications of Complex Transactions. |
FMLDO - Selected Papers |
1999 |
DBLP DOI BibTeX RDF |
transaction design, database dynamics, declarative specifications of database behavior, (static and dynamic) integrity constraints, (allowable versus available) transitions, cascading deletes, adaptations, semantics, Transactions, transaction models |
15 | Antonio Corradi, Rebecca Montanari, Cesare Stefanelli |
Mobile Agents Protection in the Internet Environment. |
COMPSAC |
1999 |
DBLP DOI BibTeX RDF |
Multiple-Hops protocol, Security, Internet, Mobile Agents, Integrity |
15 | William Currie Colket |
Code analysis of saftey-critical and real-time software using ASIS. |
SIGAda |
1999 |
DBLP DOI BibTeX RDF |
real-time, tasking, safety-critical, code analysis, ASIS, high integrity, Ada language, Ravenscar profile |
15 | Antonio Corradi, Rebecca Montanari, Cesare Stefanelli |
Security Issues in Mobile Agent Technology. |
FTDCS |
1999 |
DBLP DOI BibTeX RDF |
Security, Internet, E-commerce, Mobile Agents, Integrity |
15 | Elisa Bertino, Giovanna Guerrini |
Extending the ODMG Object Model with Composite Objects. |
OOPSLA |
1998 |
DBLP DOI BibTeX RDF |
ObjectStore, data models, integrity constraints, object-oriented database systems, composite objects |
15 | Xubo Zhang, Z. Meral Özsoyoglu |
Implication and Referential Constraints: A New Formal Reasoning. |
IEEE Trans. Knowl. Data Eng. |
1997 |
DBLP DOI BibTeX RDF |
Semantic integrity constraints, implication constraints, referential constraints, database system, query containment, semantic query optimization, refutation |
15 | Peter Lindsey, Yaowei Liu, Owen Traynor |
A Generic Model for Fine Grained Configuration Management Including Version Control and Traceability. |
Australian Software Engineering Conference |
1997 |
DBLP DOI BibTeX RDF |
fine grained configuration management, trusted support, high-integrity software development, formal specification, consistency, requirements, object-oriented database, completeness, traceability, configuration management, version control, prototype system, design documents |
15 | Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein |
Surviving information warfare attacks on databases. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency |
15 | Ian T. Foster, Nicholas T. Karonis, Carl Kesselman, Greg Koenig, Steven Tuecke |
A Secure Communications Infrastructure for High-Performance Distributed Computing. |
HPDC |
1997 |
DBLP DOI BibTeX RDF |
security-enhanced version, Nexus communication library, security/performance tradeoffs, authenticating, distributed computing, integrity, confidentiality, high-performance, security of data, users, resources, secure communications, security mechanisms |
15 | Christoph L. Schuba, Eugene H. Spafford |
A Reference Model for Firewall Technology. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
firewall technology, technological aspect, specialized engineering solution, firewall systems, integrity assurance, centralized security policy, authentication, access control, audit, reference model, computer network management, networking technologies, communications security |
15 | Jane Grimson, Eoghan Felton, Gaye Stephens, William Grimson, Damon Berry |
Interoperability issues in sharing electronic healthcare records-the Synapses approach. |
ICECCS |
1997 |
DBLP DOI BibTeX RDF |
interoperability issues, electronic healthcare records sharing, Synapses approach, pan-European project, federated database systems, distributed object-oriented environment, clinical integrity, web, standards, open systems, data warehousing, messaging, gateways |
15 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens |
Security services and public key infrastructure for ATM networks. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services |
15 | Desmond Kirkpatrick, Alberto L. Sangiovanni-Vincentelli |
Digital sensitivity: predicting signal interaction using functional analysis. |
ICCAD |
1996 |
DBLP DOI BibTeX RDF |
layout synthesis, Crosstalk, sensitivity, signal integrity |
15 | Cornelia Boldyreff, Julian Newman, Jorma Taramaa |
Managing process improvement in virtual software corporations. |
WETICE |
1996 |
DBLP DOI BibTeX RDF |
virtual software corporations, process improvement management, software development organisation process, competitive demands, large multi-site multi-organization virtual software corporations, virtual software configuration, process measurement data collection, geographically distributed projects, exception condition handling, generic process model, process quality standards, software engineering, reliability, integrity, software process improvement, software development process, software process modelling, software development management |
15 | Mark W. Maier |
Developments in System Architecting. |
ICECCS |
1996 |
DBLP DOI BibTeX RDF |
Systems Architecting, multi-disciplinary system development, naval architecting, civil architecting, research needs, education programs, data integrity, systems analysis, system development |
15 | Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell |
Key distribution without individual trusted authentification servers. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
key distribution systems, authentication servers, key distribution protocols, cross checksum scheme, cryptography, trust, protocols, data integrity, message authentication, symmetric encryption |
15 | Philip M. Johnson, Carleton A. Moore |
Investigating strong collaboration with the Annotated Egret Navigator. |
WETICE |
1995 |
DBLP DOI BibTeX RDF |
strong collaboration, Annotated Egret Navigator, structured hypertext document, graduate seminar, indirect authoring mechanisms, direct authoring mechanisms, context-sensitive change information, intermediate work products, groupware, hypermedia, database integrity, agent-based architecture |
15 | Michelle M. Hugue, Richard C. Scalzo |
Specifying fault tolerance in large complex computing systems. |
ICECCS |
1995 |
DBLP DOI BibTeX RDF |
fault tolerance specification, large complex computing systems, requirements specification phase, fault hypothesis, partially correct system, system fault hypothesis, health management function, performance, real-time systems, reliability, formal specification, integrity, fault tolerant computing, software reliability, availability, safety, confidentiality, software performance evaluation, maintainability, timeliness, quality of service requirements, system behaviors, system life-cycle, dependability constraints |
15 | Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
A Logic for Reasoning About Security. |
ACM Trans. Comput. Syst. |
1992 |
DBLP DOI BibTeX RDF |
composition knowledge, security, integrity, policy, time, logic, secrecy, permission, obligation, possible-worlds |
15 | Filippo Cacace, Stefano Ceri, Letizia Tanca, Stefano Crespi-Reghizzi |
Designing and Prototyping Data-Intensive Applications in the Logres and Algres Programming Environment. |
IEEE Trans. Software Eng. |
1992 |
DBLP DOI BibTeX RDF |
Logres, Algres, persistent data, declarative requirements, imperative code, formal specification, prototyping, programming environment, programming environments, rapid prototyping, relational algebra, integrity constraints, software prototyping, human errors, data-intensive applications, application specifications, object-oriented data modeling, rule-based programming, database language |
15 | John Mylopoulos, Alexander Borgida, Matthias Jarke, Manolis Koubarakis |
Telos: Representing Knowledge About Information Systems. |
ACM Trans. Inf. Syst. |
1990 |
DBLP DOI BibTeX RDF |
belief time, history time, knowledge base, integrity constraints, class, metaclass, instance, Telos, temporal knowledge, proposition, deductive rules |
15 | Victor M. Markowitz, Johann A. Makowsky |
Identifying Extended Entity-Relationship Object Structures in Relational Schemas. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
extended entity-relationship object structures, relation-schemes, key dependencies, key-based inclusion dependencies, referential integrity constraints, EER schema, EER-convertible, EER object structures, normalization procedure, relational database schemas, object-oriented database schemas, semantics, object-oriented programming, relational databases, database management systems, database theory, normal form, relational schemas |
15 | Che-Fn Yu, Virgil D. Gligor |
A Specification and Verification Method for Preventing Denial of Service. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
failure absence, integrity violations, user agreements, simultaneity conditions, denial-of-service prevention, formal specification, concurrent programs, security of data, specification method, verification method |
15 | Bipin C. Desai |
Performance of a Composite Attribute and Join Index. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
attribute index, composite index, B/sub c/-tree, B/sup +/-tree, common data values, structural integrity constraints, database, data structures, relational databases, tuples, join index |
15 | Joobin Choobineh, Michael V. Mannino, Jay F. Nunamaker Jr., Benn R. Konsynski |
An Expert Database Design System Based on Analysis of Forms. |
IEEE Trans. Software Eng. |
1988 |
DBLP DOI BibTeX RDF |
expert database design system, form model, form selection, entity identification, attribute attachment, relationship identification, cardinality identification, form flow, designer dialog, expert systems, expert systems, database management systems, integrity constraints, conceptual schema |
15 | Tzonelih Hwang, T. R. N. Rao |
Secret Error-Correcting Codes (SECC). |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity |
15 | Sushil V. Pillai, Ramanatham Gudipati, Leszek Lilien |
Design issues and an architecture for a heterogenous multidatabase system. |
ACM Conference on Computer Science |
1987 |
DBLP DOI BibTeX RDF |
distributed systems, reliability, database management systems, heterogeneity, semantic integrity |
15 | Michael Stonebraker, Eugene Wong 0001, Peter Kreps, Gerald Held |
The Design and Implementation of INGRES. |
ACM Trans. Database Syst. |
1976 |
DBLP DOI BibTeX RDF |
data sublanguage, query decompositon, concurrency, relational database, data integrity, query language, protection, data organization, nonprocedural language, database optimization |
15 | Peter P. Chen |
The Entity-Relationship Model - Toward a Unified View of Data. |
ACM Trans. Database Syst. |
1976 |
DBLP DOI BibTeX RDF |
Data Base Task Group, data definition and manipulation, data integrity and consistency, entity set model, logigcal view of data, semantics of data, data models, database design, relational model, network model, entity-relationship model |
15 | Naftaly H. Minsky |
On Interaction with Data Bases. |
SIGMOD Workshop, Vol. 1 |
1974 |
DBLP DOI BibTeX RDF |
Sub-schema, Privacy, Integrity, Abstraction, Data base |
14 | Flavio Lombardi, Roberto Di Pietro |
Transparent security for cloud. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
threat handling, security, cloud computing, virtual machine monitor |
14 | Jin Taek Kim, Jeong-Ho Kho, Min-Seok Hong, Choul Woong Son, Do-Won Lee, Sang-Jo Youk, Geuk Lee |
A study on intrusion protection techniques against Linux kernel backdoor. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
14 | Alodeep Sanyal, Abhisek Pan, Sandip Kundu |
A study on impact of loading effect on capacitive crosstalk noise. |
ISQED |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Qian Wang 0002, Cong Wang 0001, Jin Li 0002, Kui Ren 0001, Wenjing Lou |
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Message authentication, Authenticated encryption, Symmetric encryption, Concrete security |
14 | Ashish Kundu, Elisa Bertino |
A New Model for Secure Dissemination of XML Content. |
IEEE Trans. Syst. Man Cybern. Part C |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Zemao Chen, Xiaoping Wu, Weimin Tang |
An Executable Code Authorization Model for Secure Operating System. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf |
Public key based authentication for secure integration of sensor data and RFID. |
HeterSanet |
2008 |
DBLP DOI BibTeX RDF |
authentication, workflow, RFID, sensor, tag, certificate, public key |
14 | Mikhail J. Atallah, YounSun Cho, Ashish Kundu |
Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Lingli Deng, Yeping He, Ziyao Xu |
Service Authenticity in P2P File-Sharing. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell |
Cloaker: Hardware Supported Rootkit Concealment. |
SP |
2008 |
DBLP DOI BibTeX RDF |
security, operating system, rootkit, ARM |
14 | Bassem Elkarablieh, Sarfraz Khurshid |
Juzi: a tool for repairing complex data structures. |
ICSE |
2008 |
DBLP DOI BibTeX RDF |
systematic search, symbolic execution, assertions, error recovery, data structure repair |
14 | Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Göschka |
Availability and Performance of the Adaptive Voting Replication. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Frank Y. W. Law, Kam-Pui Chow, Michael Y. K. Kwan, Pierre K. Y. Lai |
Consistency Issue on Live Systems Forensics. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Rod Chapman |
Correctness by construction: putting engineering (back) into software. |
SIGAda |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Ravi Sahita, Uday R. Savagaonkar, Prashant Dewan, David Durham |
Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks. |
DSOM |
2007 |
DBLP DOI BibTeX RDF |
Network Access Framework, Lying Endpoint, Virtualization, Memory Protections |
14 | Brian King, Xiaolan Joy Zhang |
Securing the Pharmaceutical Supply Chain using RFID. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
pharmaceutical supply chain, security, privacy, RFID |
14 | Meng Yu 0001, Wanyu Zang, Barbara Reagor |
Decentralized Trust Management based on the Reputation of Information Sources. |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Arati Baliga, Pandurang Kamat, Liviu Iftode |
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Mohamed Nabeel, Elisa Bertino |
A structure preserving approach for securing XML documents. |
CollaborateCom |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Meng Yu 0001, Wanyu Zang, Peng Liu 0005 |
Database Isolation and Filtering against Data Corruption Attacks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Lorenz Froihofer, Karl M. Göschka, Johannes Osrael |
Middleware Support for Adaptive Dependability. |
Middleware |
2007 |
DBLP DOI BibTeX RDF |
constraint consistency, adaptivity, Middleware, dependability, replication, inconsistency |
14 | Kiron Vijayasankar, Gopalan Sivathanu, Swaminathan Sundararaman, Erez Zadok |
Exploiting type-awareness in a self-recovering disk. |
StorageSS |
2007 |
DBLP DOI BibTeX RDF |
type-awareness |
14 | Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong |
Minos: Architectural support for protecting control data. |
ACM Trans. Archit. Code Optim. |
2006 |
DBLP DOI BibTeX RDF |
Control data, worms, buffer overflow |
14 | Weidong Shi, Hsien-Hsin S. Lee |
Authentication Control Point and Its Implications For Secure Processor Design. |
MICRO |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jordi Cabot, Ernest Teniente |
Incremental Evaluation of OCL Constraints. |
CAiSE |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Boriana Vassileva, Boris Vassilev |
SBAS Vertical Protection Level Assessment in the Case of Error Reduction. |
John Vincent Atanasoff Symposium |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Mohammad Ashiqur Rahaman, Andreas Schaad, Maarten Rits |
Towards secure SOAP message exchange in a SOA. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
XML rewriting attack, sOAP account, SOA |
14 | Paolo Falcarin, Riccardo Scandariato, Mario Baldi |
Remote Trust with Aspect-Oriented Programming. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jedidiah R. Crandall, Frederic T. Chong |
A security assessment of the minos architecture. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Wei Zhang 0002 |
Replication Cache: A Small Fully Associative Cache to Improve Data Cache Reliability. |
IEEE Trans. Computers |
2005 |
DBLP DOI BibTeX RDF |
write-back cache, in-cache replication, Soft error |
14 | Brendan Hall, Kevin Driscoll 0001, Michael Paulitsch, Samar Dajani-Brown |
Ringing out Fault Tolerance. A New Ring Network for Superior Low-Cost Dependability. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Lantian Zheng, Andrew C. Myers |
End-to-End Availability Policies and Noninterference. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Michael Benedikt |
An Insider's Guide to Logic in Telecommunications Data. |
LICS |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jordi Cabot, Ernest Teniente |
Computing the Relevant Instances That May Violate an OCL Constraint. |
CAiSE |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Fangyong Hou, Zhiying Wang 0003, Kui Dai, Yun Liu |
Protecting Mass Data Basing on Small Trusted Agent. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Atsushi Kurokawa, Masaharu Yamamoto, Nobuto Ono, Tetsuro Kage, Yasuaki Inoue, Hiroo Masuda |
Capacitance and Yield Evaluations Using a 90-nm Process Technology Based on the Dense Power-Ground Interconnect Architecture. |
ISQED |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Daesung Moon, Yongwha Chung, Kiyoung Moon, Sung Bum Pan |
Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. |
ICIAR |
2005 |
DBLP DOI BibTeX RDF |
Biometrics, Embedded Processors, Fingerprint Verification |
14 | Murat R. Becer, Ravi Vaidyanathan, Chanhee Oh, Rajendran Panda |
Crosstalk noise control in an SoC physical design flow. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Soon-Kyeong Kim, David A. Carrington |
A Formal Object-Oriented Approach to defining Consistency Constraints for UML Models. |
Australian Software Engineering Conference |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Reiner Sailer, Trent Jaeger, Xiaolan Zhang 0001, Leendert van Doorn |
Attestation-based policy enforcement for remote access. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
trusted computing, security management, remote access |
14 | Dominic Osborne, Derek Abbott, Matthew Sorell, Derek Rogers |
Multiple embedding using robust watermarks for wireless medical images. |
MUM |
2004 |
DBLP DOI BibTeX RDF |
authentication, medical images, semi-fragile watermarking |
14 | Praveen Madiraju, Rajshekhar Sunderraman |
A mobile agent approach for global database constraint checking. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
multi-database systems, mobile agents, global constraints |
14 | Jedidiah R. Crandall, Frederic T. Chong |
Minos: Control Data Attack Prevention Orthogonal to Memory Model. |
MICRO |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Andrew K. Wright, John A. Kinast, Joe McCarty |
Low-Latency Cryptographic Protection for SCADA Communications. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
|
|