The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for security with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1971 (15) 1972-1974 (24) 1975-1976 (34) 1977 (18) 1978 (35) 1979 (20) 1980 (38) 1981 (78) 1982 (84) 1983 (95) 1984 (113) 1985 (112) 1986 (118) 1987 (176) 1988 (231) 1989 (305) 1990 (318) 1991 (265) 1992 (337) 1993 (540) 1994 (419) 1995 (432) 1996 (812) 1997 (766) 1998 (891) 1999 (1088) 2000 (1438) 2001 (1703) 2002 (2063) 2003 (2992) 2004 (3828) 2005 (6046) 2006 (6110) 2007 (7023) 2008 (7334) 2009 (7017) 2010 (6536) 2011 (8091) 2012 (6806) 2013 (6940) 2014 (7519) 2015 (8129) 2016 (8469) 2017 (8587) 2018 (9142) 2019 (4775) 2020 (4)
Publication types (Num. hits)
article(29869) book(303) incollection(3427) inproceedings(91546) phdthesis(877) proceedings(1894)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 43008 occurrences of 7633 keywords

Results
Found 127916 publication records. Showing 127916 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
97Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto Editorial. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
90Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Steven J. Greenwald E-Prime for security: a new security paradigm. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clark-Wilson, E-Prime, Sapir-Whorf hypothesis, disaster planning, enterprise security policy, general semantics, incident handling, informal security policy modeling, organizational security policy, principle of linguistic relativity, security life cycle, software life cycle SP800-12, user awareness, user centered security, user support and operations, modeling, formal methods, planning, RBAC, role-based access control, risk management, information assurance, security engineering, life cycle, spam detection, user training, security policy modeling, program management
64Brady R. Stevenson, Gordon W. Romney Teaching security best practices by architecting and administering an IT security lab. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF business enterprise, educational enterprise, network engineer, security architect, security best practices, security laboratory, security system engineer, information assurance, IT infrastructure
58E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine Calculating Costs for Quality of Security Service. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security service quality, security information storage, security information retrieval, task security model, variant security service invocation, dynamic network modes, abstract security level choices, resource utilization costs, efficient task schedule estimation, research prototype, scheduling, quality of service, information retrieval, scalability, computer networks, costing, costing, security of data, system integration, telecommunication security, information storage, resource management system
57T. Lowman, D. Mosier Applying the DOD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architecture. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF DoD goal security architecture, enterprise security architectures, Department of Defense Goal Security Architecture, knowledgeable security professionals, enterprise information system security profiles, multiple organizations, multiple program types, security tasks, military computing, security assessments, structured approach
55Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis An Ontology-Based Approach to Information Systems Security Management. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IS Security, Security Policy, Security Management, Security Ontology
54Uwe Jendricke, Daniela Gerd tom Markotten Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security mechanism usability, protection goals, personal security assistant, security functions configuration, security functionality, user identity selection, inexperienced users, security needs negotiation, Internet, user interfaces, user interface, human factors, Identity-Manager, personal computing, Internet applications, authorisation, telecommunication security
54Germano Caronni, Hannes Lubich, Ashar Aziz, Tom Markson, Rich Skrenta SKIP-securing the Internet. Search on Bibsonomy WETICE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF commercial use, application-coupled security, network-coupled security, plug-and-play cryptographic security, upgradable security, organically-growing security infrastructures, unsecured peers, network-layer security, IP security, dynamic security, Internet, key management, Internet Protocol, Internet security, SKIP
53Reijo Savola A Requirement Centric Framework for Information Security Evaluation. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Information security evaluation, security modeling, security metrics, security testing
51Patrick C. K. Hung, Kamalakar Karlapalem A Paradigm for Security Enforcement in CapBasED-AMS. Search on Bibsonomy CoopIS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security enforcement paradigm, CapBasED-AMS, capability-based event-driven activity management system, activity execution, problem-solving agent, multiple interdependent tasks, task execution, unauthorized modification, pilferage, illegal privacy violation, specification-time data, compile-time data, run-time data, system infrastructure, secure match-making, security constraints, task coordination model, security resource control, role-based resource security model, security policies, task scheduling, security of data, security threats, unauthorized access
50Sharon Mason, Daryl Johnson, Luther Troell Network and systems security, a collaborative approach. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, network security, information assurance, systems security
49Maxim Schnjakin, Michael Menzel 0001, Christoph Meinel A pattern-driven security advisor for service-oriented architectures. Search on Bibsonomy SWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ws-security-policy, security, web service, soa
47Daisuke Horie, Shoichi Morimoto, Noor Azimah, Yuichi Goto, Jingde Cheng ISEDS: An Information Security Engineering Database System Based on ISO Standards. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ISO/IEC 15408, An Information Security Engineering Database System, Supporting design of security facilities, Supporting maintenance of security facilities, Information security, Common Criteria
46Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF system offensiveness, liability problem, intranet security, security tools performance, distributed tools, Internet, Internet, network security, security of data, security architectures, computer network management, security attacks, DoS attacks
46Muhammad Sher, Thomas Magedanz Security Associations Management (SAM) Model for IP Multimedia System (IMS). Search on Bibsonomy Net-Con The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network Domain Security, IP Multimedia Systems, Encryption, Key Management, Security Management, Security Associations
44Manfred Holzbach Security Measures For The Austrian "Paychip" Electronic Purse Application. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF PAYCHIP, management-oriented description, Austrian nationwide electronic purse scheme, QUICK scheme, national security policy, security level evaluation, payment security maintenance, chip-card based payment infrastructure, Europay Austria, security of data, design principles, security measures
44Paul F. Syverson, James W. Gray III The epistemic representation of information flow security in probabilistic systems. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF epistemic representation, security criterion, security, verification, formal specification, information theory, security of data, formal logic, multilevel security, probabilistic systems, information flow security
43Tao Xie 0004, Xiao Qin 0001 Scheduling Security-Critical Real-Time Applications on Clusters. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security-critical applications, security overhead model, Clusters, scheduling, real-time systems
43Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne Domain and Type Enforcement Firewalls. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP
42John A. Davidson Asymmetric Isolation. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF asymmetric isolation, unidirectional security, risk-free multi-level security, absolute security rule enforcement, security violations, multi-level communication handshaking, multiple single-level nodes, unidirectional links, hardware-enforced security, performance, cost, security of data, legacy systems, mandatory access control, downgrading
42Yuan Jia-bin, Gu Kai-kai Information security control in the application of grid security. Search on Bibsonomy China HPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security control, grid, information security, grid security
42Mohammad Tehranipoor, Farinaz Koushanfar A Survey of Hardware Trojan Taxonomy and Detection. Search on Bibsonomy IEEE Design & Test of Computers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hardware Trojans, Trojan taxonomy and detection, security, design and test, ICs
42Stephen S. Yau, Zhaoji Chen A Framework for Specifying and Managing Security Requirements in Collaborative Systems. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security specification, hierarchical security requirements, requirement refinement algorithms, ontology, framework, collaborative systems, Software security
42William J. Caelli Application Security - Myth Or Reality? Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OSI security, access control, web services security, mandatory access control, security education, application security, operating system security
41Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang 0015, Dong Li An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security event, agent, network security, intelligence
41Xiaodong Yi, Xuejun Yang A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Information Flow Security Policy, Security Verification, Secure Operating System
41Jiejun Kong, Xiaoyan Hong, Mario Gerla Modeling Ad-hoc rushing attack in a negligibility-based security framework. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF asymptotic invariant, neg-ligibility, randomized network algorithms, randomized turing machine, sub-polynomial, scalability
41Marion Daubignard, Romain Janvier, Yassine Lakhnech, Laurent Mazaré Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security Games, Computational Soundness of Formal Methods, Provable Security, Probabilistic Encryption
40Christian Frühwirth On Business-Driven IT Security Management and Mismatches between Security Requirements in Firms, Industry Standards and Research Work. Search on Bibsonomy PROFES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IT Security Management, security standards, Software Security, software vulnerabilities
40Keith A. Morneau Designing an information security program as a core competency of network technologists. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, network security, IT education, information security education
40R. E. Niemeyer Using Web Technologies in Two MLS Environments: A Security Analysis. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks
40T. F. Himdi, Ravi S. Sandhu Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF lattice based models, controlled sharing, confidential information, Saudi Hajj system, pilgrimage, annual event, Saudi Arabia, government ministries, trusted environment, Saudi ministries, no obligation access security, Chinese Wall security, information flow policy, interoperability, confidentiality, data sharing, security requirements, security requirement, government data processing, shared data, multi level security
40Takeo Hamada, Takashige Hoshiai, Martin Yates A perspective on TINA service security architecture. Search on Bibsonomy WETICE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF TINA service security architecture, Telecommunication Information Network Architecture, integrated information network architecture, distributed object-oriented technology, service transaction, agreed security interests, security management context, consistent protection quality, multi-provider service domains, Common Security Service Object, application-specific extension, security of data, network operators
39Calvin Ko, Manfred Ruschitzka, Karl N. Levitt Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security-critical program execution monitoring, specification-based approach, program vulnerabilities, security specifications, real-time intrusion detection system, Unix setuid root programs, system attack detection, security violations, distributed systems, synchronization, system monitoring, audit trails, formal framework
39Danai Patiyoot Migration / Evolution of security towards wireless ATM. Search on Bibsonomy Operating Systems Review The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Blair Taylor, Shiva Azadegan Moving beyond security tracks: integrating security in cs0 and cs1. Search on Bibsonomy SIGCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information security curriculum development, computer science curriculum, security education
39Michael J. Petkac, Lee Badger Security Agility in Response to Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security agility, cooperative frameworks, malicious attacks, mission critical functionality, security policy reconfiguration, runtime security policy change, prototype toolkit, flexible host-based response, distributed systems, intrusion detection, distributed processing, software components, security of data
39James Coyle, James Demerest, Richard McAllister A Proposed Security Management Framework for the Global Information Community. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security management framework, global information community, security architect, product vendor, globally distributed systems, multiple security policies, communications network management, security infrastructure management, system management, office automation
39Kjell Näckros Learning Security through Computer Games: Studying user behavior in a real-world situation. Search on Bibsonomy World Conference on Information Security Education The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ICT Security, Game-Based Instruction, GBI, GBL, Vital Security Functions, VSF, Linear instruction, Nonlinear instruction, Education, Computer Games, Knowledge, Game-Based Learning, Learning preferences
39Igor V. Kotenko, Mikhail Stepashkin Attack Graph Based Evaluation of Network Security. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network security, Risk Assessment, Security Metrics, Vulnerability Assessment, Network attacks
38Reijo Savola, Teemu Kanstrén, Antti Evesti First International Workshop on Measurability of Security in Software Architectures -- MeSSa 2010. Search on Bibsonomy ECSA Companion Volume The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, privacy, evaluation, trust, measurement, metrics, assessment, assurance
38Xiaozhuo Gu, Yufeng Li, Jianzu Yang, Julong Lan Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IP security (IPsec), Security module, IPsec module, Security architecture
38Rogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David F. Redmiles, Jie Ren, Jennifer Ann Rode, Roberto Silveira Silva Filho Two experiences designing for effective security. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF YANCEES, effective security, event-based architecture, impromptu, peer-to-peer file-sharing application, privacy practices, theoretical security, vavoom, visualization, usable security
38Tai-Hoon Kim, Sun-myoung Hwang Intelligent Method for Building Security Countermeasures. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security countermeasure, security hole, security engineering
38Gordon W. Romney, Brady R. Stevenson An isolated, multi-platform network sandbox for teaching IT security system engineers. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF collaborative student teaching, security best practices, security laboratory, security system engineer, information technology, information assurance, data privacy, curricula
38Ralph Holbein, Thomas Gaugler IT-Security in Electronic Commerce: From Cost to Value Driver. Search on Bibsonomy DEXA Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF IT-security management, security management process, Chief Security Officer, electronic commerce, economic impact
38John Diamant Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2011 DBLP  DOI  BibTeX  RDF HP Comprehensive Applications Threat Analysis, W. Edwards Deming, dynamic application security testing, static application security testing, security requirements gap analysis, architectural threat analysis, security quality, zero day, 0-day, software development, security and privacy, security vulnerabilities
38Jae Seung Lee, Sang-Choon Kim, Seung Won Sohn A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
38Kawin Supaporn, Nakornthip Prompoon, Thongchai Rojkangsadan Enterprise Assets Security Requirements Construction from ESRMG Grammar based on Security Patterns. Search on Bibsonomy APSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin Logical Resolving for Security Evaluation. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF safety problem resolving, secure state, access control, language, logic, resolution, security model, security evaluation
37Fengyu Zhao, Xin Peng 0001, Wenyun Zhao Multi-Tier Security Feature Modeling for Service-Oriented Application Integration. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Dong-Soo Kim, Y. J. Jung, Tai-Myung Chung PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label. Search on Bibsonomy The Journal of Supercomputing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security management, security label, ESM, ISM
37Riccardo Focardi, Roberto Gorrieri, V. Panini The security checker: a semantics-based tool for the verification of security properties. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF security checker, semantics-based tool, security properties verification, security process algebra, concurrency workbench, formal specification, formal verification, specifications, process algebra, confidentiality, security of data, automatic verification
37Khaled M. Khan, Jun Han 0004 Specifying Security Goals of Component Based Systems: An End-User Perspective. Search on Bibsonomy ICCBSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security goals, end users perpective, security properties, software composition, software service
37Mingchu Li, Yongrui Cui, Yuan Tian, Dong Wang, Songyuan Yan A New Architecture of Grid Security System Construction. Search on Bibsonomy ICPP Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security rule definition, grid, framework, security system
37Konstantin Knorr, Susanne Röhrig Security of Electronic Business Applications - Structure and Quantification. Search on Bibsonomy EC-Web The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security quantifier, electronic business application, security
37Cynthia E. Irvine, Timothy E. Levin Toward a Taxonomy and Costing Method for Security Services. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security cost, quality of security service, network security service, security taxonomy, resource management system
37Alison Anderson, Dennis Longley, Lam-for Kwok Security Modelling for Organisations. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
37Yi-Ming Chen, Yung-Wei Kao Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information flow, security policy, Colored Petri Nets, SELinux
37Lanxiang Chen, Dan Feng 0001, Liang Ming The Security Threats and Corresponding Measures to Distributed Storage Systems. Search on Bibsonomy APPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF process of security, threat modeling, security threat, storage security, security measure
37Marco Cremonini, Sabrina De Capitani di Vimercati, Ernesto Damiani, Pierangela Samarati An XML-based approach to combine firewalls and web services security specifications. Search on Bibsonomy XML Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF service security, Web services, network security, firewall, SOAP
36Jan Jürjens Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. Search on Bibsonomy HASE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security software engineering, formal methods in security, electronic purses, cryptographic protocols, security models, security engineering, security evaluation, high assurance systems, security verification
36Bill Tsoumas, Dimitris Gritzalis Towards an Ontology-based Security Management. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security Knowledge, Risk Assessment, Security Management, Security Ontology
36Srivaths Ravi 0001, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan Security as a new dimension in embedded system design. Search on Bibsonomy DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF software attacks, security, performance, design, embedded systems, architectures, cryptography, sensors, PDAs, design methodologies, security protocols, digital rights management, trusted computing, tamper resistance, viruses, battery life, security processing
36Andrei Sabelfeld, Andrew C. Myers A Model for Delimited Information Release. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computer security, information flow, security policies, confidentiality, noninterference, declassification, security-type systems
36Jinx P. Walton Developing an enterprise information security policy. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, network security, policies, network management, data security, regulation, compliance, unauthorized access
36James J. Horning Words Matter: Privacy, Security, and Related Terms. Search on Bibsonomy ISIPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF freedom of speech, security, Privacy, network security, computer security, definitions, homeland security, national security
36Ian Brown, B. Laurie Security Against Compelled Disclosure. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF compelled disclosure, confidential information, government agencies, national economic security, organised crime, information assets, ethics, security of data, data security, data privacy, telecommunication security, legislation, legislation, organisations, computer crime, communication security
36Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark R. Heckman, William R. Shockley The SeaView Security Model. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF policy formalization, new data, SeaView security model, clearances, mandatory security, standard relational model, multilevel relations, discretionary security, application-independent properties, entity integrity, polyinstantiation integrity, classifications, software engineering, relational databases, security of data, users, labeling, data consistency, reference monitor, formal security model, referential integrity, derived data, multilevel database
36Wen-Pai Lu, Malur K. Sundareshan A Model for Multilevel Security in Computer Networks. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF multilevel secure network, security classes, security clearances, nondiscretionary access control, trusted network base, set-theoretic concepts, computer networks, computer networks, security policy, security of data, information flow control, computer systems, multilevel security, subjects, entities, network devices
36Gustavo A. Santana Torrellas A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen Using Security Patterns to Combine Security Metrics. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security metrics, security patterns
36Aris Zakinthinos, E. Stewart Lee A General Theory of Security Properties. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1997 DBLP  DOI  BibTeX  RDF possibilistic security properties, low level event sequence, security predicate, high level users, low level users, Selective Interleaving Functions framework, information theory, information flow, security of data, partial ordering, data confidentiality, event systems
35Sourour Meharouech, Adel Bouhoula, Tarek Abbes Ensuring security in depth based on heterogeneous network security technologies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Management of interaction, Devices’ collaboration, Network security, Security technologies
35Jan Jürjens, Yijun Yu Tools for model-based security engineering: models vs. code. Search on Bibsonomy ASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security hardening, verification framework, security, UML, refactoring, code analysis, model-based software engineering
35Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides Quantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fuzzy Risk Analysis, Software Security, Security Patterns
35Christine Artelsmair, Wolfgang Eßmayr, Peter Lang, Roland R. Wagner, Edgar R. Weippl CoSMo: An Approach Towards Conceptual Security Modeling. Search on Bibsonomy DEXA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, conceptual modeling, security modeling
35Reijo Savola Towards a taxonomy for information security metrics. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information security metrics, security assurance, network security, software security, information assurance
35Barbara C. Davis, Tatu Ylönen Working Group Report on Internet/Intranet Security. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF intranet security, key backup, security implementation costs, security functionality, fault tolerance, Internet, enterprises, secure communications, Internet security, data protection, information infrastructure, key recovery, key escrow, law enforcement, redundant paths, data value
35Gary W. Smith Modeling Security-Relevant Data Semantics. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF inference vulnerability, extended data model, Semantic Data Model for Security, signaling vulnerabilities, security-relevant data semantics, multilevel secure automated information system, database management systems, security of data, database design, security requirements, secrecy
35Srdjan Capkun, Jean-Pierre Hubaux BISS: building secure routing out of an incomplete set of security associations. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, routing, ad hoc networks, mobility, security associations
34Haider Abbas, Louise Yngström, Ahmed Hemani Adaptability infrastructure for bridging IT security evaluation and options theory. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF it product evaluation, it security evaluation, options theory
34Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean A Security Model for Military Message Systems: Retrospective. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Storage channels, Security, Verification, confinement, message systems
34Chris Grier, Shuo Tang, Samuel T. King Secure Web Browsing with the OP Web Browser. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, browser, web security
34Rudolf Schreiner, Ulrich Lang Protection of complex distributed systems. Search on Bibsonomy Middleware Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF service oriented architecture, distributed systems security, model driven security
34Stephen F. Burnett Computer Security Training and Education: A Needs Analysis. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1996 DBLP  DOI  BibTeX  RDF computer security training, computer security education, employer's perspective, security practitioners, training, computer science education, security of data, industry, employment, needs analysis
34Paul El Khoury, Amine Mokhtari, Emmanuel Coquery, Mohand-Said Hacid An Ontological Interface for Software Developers to Select Security Patterns. Search on Bibsonomy DEXA Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ontology, Profiles, Security Patterns
34Michael Cooper, SueAnn Lipinski, Chet Cook, Cathy Orndorff Is3pace: casting the information security spell for cultural change. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF collaboration, education, training, awareness, policies, information security, practices
34Guoling Lao, Liping Wang Application of e-commerce security management strategy in banking. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security management strategy, e-commerce, risk, bank
34Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini Web services enterprise security architecture: a case study. Search on Bibsonomy SWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, web services, software architecture, software development process
34Jaehong Park, Ravi S. Sandhu, J. Schifalacqua Security Architectures for Controlled Digital Information Dissemination. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF controlled digital information dissemination, application-level security, use control, control set, distribution style, cryptography, virtual machine, watermarking, security of data, business data processing, information dissemination, security architectures, business, copy protection
34Dianxiang Xu, Kendall E. Nygard Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF aspect-oriented Petri nets, modeling, verification, Petri nets, aspect-oriented software development, Software security, threat modeling
34Gerald Brose A Gateway to Web Services Security - Securing SOAP with Proxies. Search on Bibsonomy ICWS-Europe The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SOAP message security, Web Services, WS-Security, security architecture, SAML
34Chenghua Tang, Shunzheng Yu Assessment of Network Security Policy Based on Security Capability. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Rose-Mharie Åhlfeldt, Paolo Spagnoletti, Guttorm Sindre Improving the Information Security Model by using TFI. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Paul A. Karger The Lattice Security Model In A Public Computing Network. Search on Bibsonomy ACM Annual Conference (1) The full citation details ... 1978 DBLP  DOI  BibTeX  RDF Data processing security, Lattice security model, Non-discretionary security, Computer security, Computer network security
34Anirban Sengupta, Mridul Sankar Barik Towards a Formal Specification Method for Enterprise Information System Security. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Wenliang Du, Praerit Garg, Aditya P. Mathur Security Relevancy Analysis on the Registry of Windows NT 4.0. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
34Liqun Chen, Hoon Wei Lim, Wenbo Mao User-Friendly Grid Security Architecture and Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Grid Security Infrastructure, Public-key Authentication Framework, Dynamic Public Keys, Security Protocols, Grid Security
Displaying result #1 - #100 of 127916 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license