|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
14 | Giuliano Casale, Stefano Zanero |
GIVS: Integrity Validation for Grid Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part III, pp. 147-154, 2005, Springer, 3-540-26044-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Alin Deutsch, Bertram Ludäscher, Alan Nash |
Rewriting Queries Using Views with Access Patterns Under Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDT ![In: Database Theory - ICDT 2005, 10th International Conference, Edinburgh, UK, January 5-7, 2005, Proceedings, pp. 352-367, 2005, Springer, 3-540-24288-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Stefano Grivet-Talocia, Igor S. Stievano, Ivan A. Maio, Flavio G. Canavero |
Linear and nonlinear macromodels for power/signal integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (6) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 5754-5757, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Nobuyuki Nishiguchi |
An advance RTL to GDS2 design methodology for 90 nm and below system LSIs to solve timing closure, signal integrity and design for manufacturing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (6) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 5938-5941, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Martin Jandl, Alexander Szep, Robert Smeikal, Karl M. Göschka |
Increasing Availability by Sacrificing Data Integrity - A Problem Statement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder |
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 423-432, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas |
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA, pp. 139-153, 2005, IEEE Computer Society, 0-7695-2339-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Thomas Werner, Claus Vetter |
Data integrity in electric utility IT systems: a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of 10th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2005, September 19-22, 2005, Catania, Italy, 2005, IEEE, 0-7803-9401-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Leopoldo E. Bertossi, Loreto Bravo, Enrico Franconi, Andrei Lopatenko |
Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBPL ![In: Database Programming Languages, 10th International Symposium, DBPL 2005, Trondheim, Norway, August 28-29, 2005, Revised Selected Papers, pp. 262-278, 2005, Springer, 3-540-30951-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Ajoy Kumar Palit, Volker Meyer, Walter Anheier, Jürgen Schlöffel |
ABCD Modeling of Crosstalk Coupling Noise to Analyze the Signal Integrity Losses on the Victim Interconnect in DSM Chips. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 18th International Conference on VLSI Design (VLSI Design 2005), with the 4th International Conference on Embedded Systems Design, 3-7 January 2005, Kolkata, India, pp. 354-359, 2005, IEEE Computer Society, 0-7695-2264-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Michael J. Smith 0004, Marie desJardins |
A framework for decomposing reputation in MAS into competence and integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 1253-254, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Sophie Cockcroft |
The Design and Implementation of a Repository for the Management of Spatial Data Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GeoInformatica ![In: GeoInformatica 8(1), pp. 49-69, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
spatial data quality, user interface, repository, business rules, system development, database constraints |
14 | Fabian Vargas 0001, Rubem Dutra Ribeiro Fagundes, Daniel Barros Jr., Diogo B. Brum, Eduardo Luis Rhod |
Merging a DSP-Oriented Signal Integrity Technique and SW-Based Fault Handling Mechanisms to Ensure Reliable DSP Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 20(4), pp. 397-411, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
digital signal processing (DSP) systems, electromagnetic interference (EMI), speech recognition system (SRS), on-line testing, noise immunity |
14 | Robyn R. Lutz, Ines Carmen Mikulski |
Ongoing Requirements Discovery in High-Integrity Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 21(2), pp. 19-25, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
requirements/specifications management, maintenance and enhancement, software and system safety, error processing, distribution, product metrics |
14 | Josep Rius Vázquez, José Pineda de Gyvez |
Power Supply Noise Monitor for Signal Integrity Faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), 16-20 February 2004, Paris, France, pp. 1406-1407, 2004, IEEE Computer Society, 0-7695-2085-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Jordi Cabot, Jordi Conesa |
Automatic Integrity Constraint Evolution due to Model Subtract Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER (Workshops) ![In: Conceptual Modeling for Advanced Application Domains, ER 2004 Workshops CoMoGIS, COMWIM, ECDM, CoMoA, DGOV, and ECOMO, Shanghai, China, November 8-12, 2004, Proceedings, pp. 350-362, 2004, Springer, 3-540-23722-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Arso Savanovic, Dusan Gabrijelcic, Borka Jerman-Blazic, Janez Bester |
Implementation and Evaluation of Integrity Protection Facilities for Active Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part III, pp. 179-186, 2004, Springer, 3-540-22116-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Su-Wei Wu, Yao-Wen Chang |
Efficient power/ground network analysis for power integrity-driven design methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 41th Design Automation Conference, DAC 2004, San Diego, CA, USA, June 7-11, 2004, pp. 177-180, 2004, ACM, 1-58113-828-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
footnotesize floorplanning, power/ground network |
14 | Adrian J. Hilton, Jon G. Hall |
High-Integrity Interfacing to Programmable Logic with Ada. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe 2004, 9th Ada-Europe International Conference on Reliable Software Technologies, Palma de Mallorca, Spain, June 14-18, 2004, Proceedings, pp. 249-260, 2004, Springer, 3-540-22011-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon |
Tamper Resistant Software by Integrity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 608-612, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Tamper Resistant Software, Security, Software Protection |
14 | Jagun Kwon, Andy J. Wellings, Steve King 0001 |
Assessment of the Java programming language for use in high integrity systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 38(4), pp. 34-46, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Vittorio Ricchiuti |
Power Bus Signal Integrity Improvement and EMI Mitigation on Multilayer High-Speed Digital PCBs with Embedded Capacitance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 2(4), pp. 314-321, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Embedded capacitance, power bus, power/ground layers, power supply decoupling, electric field strength, S-parameters |
14 | Andrew J. Fry |
Integrity-based self-validation test scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 52(2), pp. 162-167, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Boris Dahav, Opher Etzion |
Distributed Enforcement of Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Parallel Databases ![In: Distributed Parallel Databases 13(3), pp. 227-249, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
database exception handling, self-stabilization in databases, distributed rules systems, distributed databases |
14 | Andrea Calì, Saverio De Nigris, Domenico Lembo, Gabriele Messineo, Riccardo Rosati 0001, Marco Ruzzi |
DIS@DIS: A System for Semantic Data Integration under Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: 4th International Conference on Web Information Systems Engineering, WISE 2003, Rome, Italy, December 10-12, 2003, pp. 335-338, 2003, IEEE Computer Society, 0-7695-1999-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Andrea Acquaviva, Alessandro Bogliolo |
A Bottom-Up Approach to On-Chip Signal Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design, Power and Timing Modeling, Optimization and Simulation, 13th International Workshop, PATMOS 2003, Torino, Italy, September 10-12, 2003, Proceedings, pp. 540-549, 2003, Springer, 3-540-20074-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Antoni Olivé |
Integrity Constraints Definition in Object-Oriented Conceptual Modeling Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER ![In: Conceptual Modeling - ER 2003, 22nd International Conference on Conceptual Modeling, Chicago, IL, USA, October 13-16, 2003, Proceedings, pp. 349-362, 2003, Springer, 3-540-20299-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh |
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 188-207, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli |
Compositional Verification of Integrity for Digital Stream Signature Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSD ![In: 3rd International Conference on Application of Concurrency to System Design (ACSD 2003), 18-20 June 2003, Guimaraes, Portugal, pp. 142-149, 2003, IEEE Computer Society, 0-7695-1887-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Mauro Borchardt, Carlos Maziero, Edgard Jamhour |
An Architecture for On-the-Fly File Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LADC ![In: Dependable Computing, First Latin-American Symposium, LADC 2003, Sao Paulo, Brazil, October 21-24, 2003, Proceedings, pp. 117-126, 2003, Springer, 3-540-20224-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Tetsu Iwata, Kaoru Kurosawa |
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings, pp. 306-318, 2003, Springer, 3-540-20663-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Wolfgang A. Halang |
Automated Control Systems for the Safety Integrity Levels 3 and 4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORDS Fall ![In: 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 1-3 October 2003, Anacapri (Capri Island), Italy, pp. 35-, 2003, IEEE Computer Society, 0-7695-2054-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Anna Formica |
Finite Satisfiability of Integrity Constraints in Object-Oriented Database Schemas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 14(1), pp. 123-139, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
constraint satisfiability (consistency), recursive schemas, axioms of infinity, equality constraints, object-oriented databases |
14 | Paul F. Ross |
Whatever became of integrity? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 45(9), pp. 27-28, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW), HTML |
14 | Qiang Gu, Alan Marshall 0001 |
Using CORBA's Advanced Services to Enhance the Integrity of QoS Management Programmable Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMNS ![In: Management of Multimedia on the Internet, 5th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2002, Santa Barbara, CA, USA, October 6-9, 2002, Proceedings, pp. 140-153, 2002, Springer, 3-540-44271-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Mark A. Hale |
Maintaining Referential Integrity on the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFEM ![In: Formal Methods and Software Engineering, 4th International Conference on Formal Engineering Methods, ICFEM 2002 Shanghai, China, October 21-25, 2002, Proceedings, pp. 20-21, 2002, Springer, 3-540-00029-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Andrea Calì, Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini |
Data Integration under Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 14th International Conference, CAiSE 2002, Toronto, Canada, May 27-31, 2002, Proceedings, pp. 262-279, 2002, Springer, 3-540-43738-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Soon-Kyeong Kim, David A. Carrington |
A Formal Model of the UML Metamodel: The UML State Machine and Its Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ZB ![In: ZB 2002: Formal Specification and Development in Z and B, 2nd International Conference of B and Z Users, Grenoble, France, January 23-25, 2002, Proceedings, pp. 497-516, 2002, Springer, 3-540-43166-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Harith Alani, Srinandan Dasmahapatra, Nicholas Gibbins, Hugh Glaser, Steve Harris, Yannis Kalfoglou, Kieron O'Hara, Nigel Shadbolt |
Managing Reference: Ensuring Referential Integrity of Ontologies for the Semantic Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EKAW ![In: Knowledge Engineering and Knowledge Management. Ontologies and the Semantic Web, 13th International Conference, EKAW 2002, Siguenza, Spain, October 1-4, 2002, Proceedings, pp. 317-334, 2002, Springer, 3-540-44268-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Amir Attarha, Mehrdad Nourani |
Test Pattern Generation for Signal Integrity Faults on Long Interconnects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 20th IEEE VLSI Test Symposium (VTS 2002), Without Testing It's a Gamble, 28 April - 2 May 2002, Monterey, CA, USA, pp. 336-344, 2002, IEEE Computer Society, 0-7695-1570-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Rajgopal Kannan, Sudipta Sarangi, Sibabrata Ray, S. Sitharama Iyengar |
Minimal Sensor Integrity in Sensor Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 31st International Conference on Parallel Processing (ICPP 2002), 20-23 August 2002, Vancouver, BC, Canada, pp. 567-571, 2002, IEEE Computer Society, 0-7695-1677-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Darko Kirovski, Milenko Drinic, Miodrag Potkonjak |
Enabling trusted software integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, USA, October 5-9, 2002., pp. 108-120, 2002, ACM Press, 1-58113-574-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Peter P. Puschner, Andy J. Wellings |
A Profile for High-Integrity Real-Time Java Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: 4th International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2001), 2-4 May 2001, Magdeburg, Germany, pp. 15-22, 2001, IEEE Computer Society, 0-7695-1089-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Hilarie K. Orman |
Data Integrity for Mildly Active Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Active Middleware Services ![In: 3rd Annual International Workshop on Active Middleware Services (AMS 2001), 6 August 2001, San Francisco, CA, USA, pp. 73-77, 2001, IEEE Computer Society, 0-7695-1528-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Josef Scharinger |
Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2001, First International Conference, Colmar, France, July 9-13, 2001 Proceedings, Part 2, pp. 196-205, 2001, Springer, 3-540-42303-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi |
On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 248-265, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Francesco Buccafurri, Filippo Furfaro, Domenico Saccà |
Estimating Range Queries Using Aggregate Data with Integrity Constraints: A Probabilistic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDT ![In: Database Theory - ICDT 2001, 8th International Conference, London, UK, January 4-6, 2001, Proceedings., pp. 390-404, 2001, Springer, 3-540-41456-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Xavier Hannotin, Paolo Maggi, Riccardo Sisto |
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Agents ![In: Mobile Agents, 5th International Conference, MA 2001 Atlanta, GA, USA, December 2-4, 2001, Proceedings, pp. 42-53, 2001, Springer, 3-540-42952-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Gordon S. Blair, Geoff Coulson, Michael Clarke, Nikos Parlavantzas |
Performance and Integrity in the OpenORB Reflective Middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reflection ![In: Metalevel Architectures and Separation of Crosscutting Concerns, Third International Conference, REFLECTION 2001, Kyoto, Japan, September 25-28, 2001, Proceedings, pp. 268-269, 2001, Springer, 3-540-42618-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Richard Rabbat, Tom McNeal, Tim Burke |
A High-Availability Clustering Architecture with Data Integrity Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: 2001 IEEE International Conference on Cluster Computing (CLUSTER 2001), 8-11 October 2001, Newport Beach, CA, USA, pp. 178-182, 2001, IEEE Computer Society, 0-7695-1116-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Diomidis Spinellis |
Reflection as a mechanism for software integrity verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 3(1), pp. 51-62, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
message digest, cryptographic hash function, embedded device |
14 | John R. Michener, Tolga Acar |
Managing System and Active-Content Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 33(7), pp. 108-110, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Tim Clement, Ian Cottam, Peter K. D. Froome, Claire Jones |
The Development of a Commercial "Shrink-Wrapped Application" to Safety Integrity Level 2: The DUST-EXPERTTM Story. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 18th International Conference, SAFECOMP'99, Toulouse, France, September, 1999, Proceedings, pp. 216-225, 1999, Springer, 3-540-66488-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Isabelle Mirbel, Barbara Pernici, Michalis Vazirgiannis |
Temporal Integrity Constraints in Interactive Multimedia Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS, Vol. 2 ![In: IEEE International Conference on Multimedia Computing and Systems, ICMCS 1999, Florence, Italy, June 7-11, 1999. Volume II, pp. 867-871, 1999, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
14 | John K. Debenham |
Context as Fuzzy Degrees of Acceptability for Knowledge Base Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONTEXT ![In: Modeling and Using Context, Second International and Interdisciplinary Conference, CONTEXT'99, Trento, Italy, September 1999, Proceedings, pp. 459-462, 1999, Springer, 3-540-66432-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Laura Mota-Herranz, Matilde Celma |
Automatic Generation of Trigger Rules for Integrity Enforcement in Relational Databases with View Definition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FQAS ![In: Flexible Query Answering Systems, Third International Conference, FQAS'98, Roskilde, Denmark, May 13-15, 1998, Proceedings, pp. 286-297, 1998, Springer, 3-540-65082-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
14 | Rolf Drechsler |
Verifying Integrity of Decision Diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 17th International Conference, SAFECOMP'98, Heidelberg, Germany, October 5-7, 1998, Proceedings, pp. 380-389, 1998, Springer, 3-540-65110-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
14 | Alan Burns 0001, Brian Dobbing, George Romanski |
The Ravenscar Tasking Profile for High Integrity Real-Time Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe '98, 1998 Ada-Europe International Conference on Reliable Software Technologies, Uppsala, Sweden, June 8-12, 1998, Proceedings, pp. 263-275, 1998, Springer, 3-540-64536-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
14 | W. L. Yeung |
Semantics-Based Support Tools for High Integrity Ada Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe '97, 1997 Ada-Europe International Conference on Reliable Software Technologies, London, UK, June 2-6, 1997, Proceedings, pp. 100-111, 1997, Springer, 3-540-63114-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
14 | Akhil Kumar 0001, J. Leon Zhao |
A Framework for Dynamic Routing and Operational Integrity Controls in a Workflow Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (3) ![In: 29th Annual Hawaii International Conference on System Sciences (HICSS-29), January 3-6, 1996, Maui, Hawaii, USA, pp. 492-501, 1996, IEEE Computer Society, 0-8186-7324-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
14 | Ashish Gupta 0001, Jennifer Widom |
Local Verification of Global Integrity Constraints in Distributed Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, DC, USA, May 26-28, 1993., pp. 49-58, 1993, ACM Press, 978-0-89791-592-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
SQL, Datalog |
14 | Swarup Reddi |
Integrity Constraint Enforcement in the Functional Database Language PFL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advances in Databases, 11th British National Conference on Databases, BNCOD 11, Keele, UK, July 7-9, 1993, Proceedings, pp. 238-257, 1993, Springer, 3-540-56921-9. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
14 | Jan Chomicki |
Real-Time Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Eleventh ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 2-4, 1992, San Diego, California, USA, pp. 274-282, 1992, ACM Press, 0-89791-519-4. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
14 | M. M. Fonkam, W. A. Gray |
Employing Integrity Constraints for Query Modification and Intensional Answer Generation in Multi-database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advanced Database Systems, 10th British National Conference on Databases, BNCOD 10, Aberdeen, Scotland, UK, July 6-8, 1992, Proceedings, pp. 244-260, 1992, Springer, 3-540-55693-1. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
14 | Ken Satoh, Noboru Iwayama |
A Correct Goal-directed Proof Procedure for a General Logic Program with Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ELP ![In: Extensions of Logic Programming, Third International Workshop, ELP'92, Bologna, Italy, February 26-28, 1992, Proceedings, pp. 24-44, 1992, Springer, 3-540-56454-3. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
14 | Bart Preneel, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen |
Race Integrity Primitives Evaluation (RIPE): A Status Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 547-551, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
14 | Rainer Manthey |
Integrity and Recursion: Two Key Issues for Deductive Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IS/KI ![In: Information Systems and Artificial Intelligence: Integration Aspects, First Workshop, Ulm, FRG, March 19-21, 1990, Proceedings, pp. 104-126, 1990, Springer, 3-540-53557-8. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
14 | Olga De Troyer |
RIDL*: A Tool for the Computer-Assisted Engineering of Large Databases in the Presence of Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1989 ACM SIGMOD International Conference on Management of Data, Portland, Oregon, USA, May 31 - June 2, 1989., pp. 418-429, 1989, ACM Press, 978-0-89791-317-1. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
14 | Joos Vandewalle, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen |
A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 267-271, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
14 | Subhasish Mazumdar, David W. Stemple, Tim Sheard |
Resolving the Tension between Integrity and Security Using a Theorem Prover. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1988 ACM SIGMOD International Conference on Management of Data, Chicago, Illinois, USA, June 1-3, 1988., pp. 233-242, 1988, ACM Press, 978-0-89791-268-6. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
14 | Udo W. Lipeck, Dasu Feng |
Construction of Deterministic Transition Graphs from Dynamic Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WG ![In: Graph-Theoretic Concepts in Computer Science, 14th International Workshop, WG '88, Amsterdam, The Netherlands, June 15-17, 1988, Proceedings, pp. 166-179, 1988, Springer, 3-540-50728-0. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
14 | James P. Delgrande |
Formal Limits on the Automatic Generation and Maintenance of Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Sixth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, March 23-25, 1987, San Diego, California, USA, pp. 190-196, 1987, ACM, 0-89791-223-3. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
14 | Richard A. Smith, Leslie Chalmers, Charles C. Wood |
Security and audit: Needs of the business sector for security and integrity controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Annual Conference ![In: Proceedings of the 1984 ACM Annual Conference on Computer Science: The fifth generation challenge, San Francisco, CA, USA, October 1984, pp. 246, 1984, ACM, 0-89791-144-X. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
14 | Elizabeth N. Fong, Stephen R. Kimbleton |
Database semantic integrity for a network data manager. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1980 National Computer Conference, 19-22 May 1980, Anaheim, California, USA, pp. 261-268, 1980, AFIPS Press, 978-1-4503-7923-6. The full citation details ...](Pics/full.jpeg) |
1980 |
DBLP DOI BibTeX RDF |
|
14 | Rudolf Bayer |
On the Integrity of Data Bases and Resource Locking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IBM Symposium: Data Base Systems ![In: Data Base Systems, Proceedings, 5th Informatik Symposium, IBM Germany, Bad Homburg v. d. H., September 24-26, 1975, pp. 339-361, 1975, Springer, 3-540-07612-3. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
10 | He Wang 0020, Sylvia L. Osborn |
Static and Dynamic Delegation in the Role Graph Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 23(10), pp. 1569-1582, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
security, Access controls, integrity and protection |
10 | Carl A. Gunter, David M. Liebovitz, Bradley A. Malin |
Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(5), pp. 48-55, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
security and privacy protection knowledge, data engineering tools and techniques, security, privacy, integrity and protection, public policy issues |
10 | Shubhashis Sengupta, Vikrant S. Kaulgud, Vibhu Saujanya Sharma |
Cloud Computing Security-Trends and Research Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4-9, 2011, pp. 524-531, 2011, IEEE Computer Society, 978-1-4577-0879-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Security, Cloud Computing, Data integrity, Survey, confidentiality, Trusted Computing |
10 | Krzysztof Kepa, Fearghal Morgan, Peter Athanas |
ERDB: An Embedded Routing Database for Reconfigurable Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: International Conference on Field Programmable Logic and Applications, FPL 2011, September 5-7, Chania, Crete, Greece, pp. 195-200, 2011, IEEE Computer Society, 978-1-4577-1484-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
design integrity, security, FPGA, autonomic computing, partial reconfiguration, configurable systems |
10 | Ahmed A. Ataullah, Frank Wm. Tompa |
Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 73-80, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
modeling integrity constraints, object lifecycle modeling, relational database, records management |
10 | Sean Turner |
Secure/Multipurpose Internet Mail Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 14(5), pp. 82-86, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
S/MIME, message integrity, non-repudiation of origin, Internet, authentication, digital signatures, encryption, IETF, data confidentiality |
10 | Weilian Su, Nikolaos V. Alchazidis, Tri T. Ha |
Multiple RFID Tags Access Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 9(2), pp. 174-187, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Passive RFID systems, framed slotted aloha, progressing scanning algorithm, data integrity, tags, collisions |
10 | Ron Kohavi, Roger Longbotham, Toby Walker |
Online Experiments: Practical Lessons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 43(9), pp. 82-85, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Online experiments, Data traps, Statistical integrity constraints, Web technologies |
10 | Haibo Hu 0001, Jianliang Xu |
2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 21(10), pp. 1458-1472, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, integrity, distributed applications, Mobile applications, protection |
10 | Kyriacos E. Pavlou, Richard T. Snodgrass |
The Tiled Bitmap Forensic Analysis Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 22(4), pp. 590-601, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, temporal databases, Database management, integrity and protection |
10 | Marco A. Casanova, Tanara Lauschner, Luiz André P. Paes Leme, Karin Koogan Breitman, António L. Furtado 0001, Vânia Maria Ponte Vidal |
Modeling the Mediated Schema Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 17th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2010, Oxford, England, UK, 22-26 March 2010, pp. 393-402, 2010, IEEE Computer Society, 978-0-7695-4005-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
mediated schema, Description Logics, Integrity constraint |
10 | Thomas Zefferer, Thomas Knall |
An electronic-signature based circular resolution database system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1840-1845, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Austrian citizen card, business workflow, circular resolution, qualified electronic signature, integrity, decision making, non-repudiation, electronic document |
10 | Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi |
A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 192-197, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data integrity, web application, web based-systems, HMAC, security vulnerabilities, tampering, Web authentication |
10 | Niko Popitsch, Bernhard Haslhofer |
DSNotify: handling broken links in the web of data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 761-770, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
instance matching, link integrity, blocking, linked data, broken links |
10 | Takamasa Isohara, Keisuke Takemori, Yutaka Miyake, Ning Qu, Adrian Perrig |
LSM-Based Secure System Monitoring Using Kernel Protection Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 591-596, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Secure system monitoring, Linux Security Module, Lifetime kernel code integrity, Mandatory Access Control |
10 | A. A. Adekunle, S. R. Woodhead |
Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 216-221, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
integrity, block ciphers, information security, message authentication, ubiquitous networks |
10 | Joel Mana Gonçalves |
Privacy and Information Security in Brazil? Yes, We Have It and We Do It! ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 702-707, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Integrity, Management, Policies, Availability, Certification, Confidentiality |
10 | Khan Ferdous Wahid |
Maximizing Ethernet Security by Switch-Based Single Secure Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 774-778, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
global confidentiality, global integrity, LAN security, MACsec, secure device identity |
10 | Steve Barker |
Personalizing access control by generalizing access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 149-158, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
integrity, privacy policies, access control models |
10 | Kelvin Nilsen |
Ada-Java middleware for legacy software modernization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JTRES ![In: Proceedings of the 8th International Workshop on Java Technologies for Real-Time and Embedded Systems, JTRES 2010, Prague, Czech Republic, August 19-21, 2010, pp. 85-94, 2010, ACM, 978-1-4503-0122-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
mixed-language development, software modernization, Java, real-time, Ada, safety-critical, object oriented development, high-integrity systems, mission-critical |
10 | Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig |
TrustVisor: Efficient TCB Reduction and Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 143-158, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Minimal TCB, Virtualization, Trusted Computing, TPM, Attestation, Integrity Measurement |
10 | Mikolaj Bojanczyk, Anca Muscholl, Thomas Schwentick, Luc Segoufin |
Two-variable logic on data trees and XML reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 56(3), pp. 13:1-13:48, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
XML, consistency, Integrity constraints, DTDs, implications |
10 | Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 |
Using IND-CVA for constructing secure communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(10), pp. 1801-1811, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
integrity, authenticated encryption, semantic security, universally composable security, secure channel |
10 | Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang |
Ciphertext verification security of symmetric encryption schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(9), pp. 1617-1631, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption |
10 | Di Ma, Gene Tsudik |
A new approach to secure logging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Storage ![In: ACM Trans. Storage 5(1), pp. 2:1-2:21, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Secure logging, forward secure sequential aggregate (FssAgg) authentication, forward-secure stream integrity, MACs, signatures, truncation attack |
|
|