The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase security policy (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1981-1990 (20) 1991-1994 (17) 1995-1996 (19) 1997-1998 (26) 1999 (17) 2000 (37) 2001 (28) 2002 (46) 2003 (57) 2004 (46) 2005 (67) 2006 (90) 2007 (117) 2008 (104) 2009 (87) 2010 (44) 2011 (43) 2012 (30) 2013 (27) 2014 (26) 2015 (32) 2016 (52) 2017 (31) 2018 (43) 2019 (2)
Publication types (Num. hits)
article(238) incollection(14) inproceedings(850) phdthesis(6)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1022 occurrences of 522 keywords

Results
Found 1108 publication records. Showing 1108 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
250Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
100Debabrata Nayak An Adaptive and Optimized Security Policy Manager for Wireless Networks. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network Element, Security Policy index, Security Policy Factor, SQoS, Policy optimizer
92Steven J. Greenwald E-Prime for security: a new security paradigm. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clark-Wilson, E-Prime, Sapir-Whorf hypothesis, disaster planning, enterprise security policy, general semantics, incident handling, informal security policy modeling, organizational security policy, principle of linguistic relativity, security life cycle, software life cycle SP800-12, user awareness, user centered security, user support and operations, modeling, formal methods, planning, RBAC, role-based access control, risk management, information assurance, security engineering, life cycle, spam detection, user training, security policy modeling, program management
81Padmalochan Bera, Soumya Kanti Ghosh 0001, Pallab Dasgupta Formal Verification of Security Policy Implementations in Enterprise Networks. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access control list (ACL), Formal Verification, Network security, Security Policy
80Yi-Ming Chen, Yung-Wei Kao Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information flow, security policy, Colored Petri Nets, SELinux
78Yiwen Liang, Wenjun Deng Verify Consistency between Security Policy and Firewall Policy with Answer Set Programming. Search on Bibsonomy CSSE (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
73Nazim Benaïssa, Dominique Cansell, Dominique Méry Integration of Security Policy into System Modeling. Search on Bibsonomy B The full citation details ... 2007 DBLP  DOI  BibTeX  RDF integration, refinement, security policy
73Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix Security policy compliance with violation management. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF labeled kripke structure, temporal logic, security policy, deontic logic, violation
71Igor V. Kotenko, Artem Tishkov, Olga Chervatuk, Ekaterina Sidelnikova Security Policy Verification Tool for Geographical Information Systems. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, verification, security policy
67Maxim Schnjakin, Michael Menzel 0001, Christoph Meinel A pattern-driven security advisor for service-oriented architectures. Search on Bibsonomy SWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ws-security-policy, security, web service, soa
66Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang Design and implementation of a tool for analyzing SELinux secure policy. Search on Bibsonomy Int. Conf. Interaction Sciences The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security policy configuration, security policy description language, SELinux, integrity verification
66Patrick C. K. Hung, Guang-Sha Qiu Specifying conflict of interest assertions in WS-policy with Chinese wall security policy. Search on Bibsonomy SIGecom Exchanges The full citation details ... 2003 DBLP  DOI  BibTeX  RDF WS-policy attachment, security assertion, XML, security policy, delegation, matchmaking, conflict of interest, WS-policy, service locators, Chinese wall security policy
63Chenghua Tang, Shunzheng Yu Assessment of Network Security Policy Based on Security Capability. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Rasool Jalili, Mohsen Rezvani Specification and Verification of Security Policies in Firewalls. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Formal Specification, Security Policy, Firewall
61Fumiko Satoh, Takehiro Tokuda Security Policy Composition for Composite Services. Search on Bibsonomy ICWE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
59Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood Employees' Behavior towards IS Security Policy Compliance. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
57Saravanan Muthaiyah, Larry Kerschberg Virtual organization security policies: An ontology-based integration approach. Search on Bibsonomy Information Systems Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security policy ontology, Security policy domain model, Ontology mapping, Semantic mapping
56Won Young Lee, Hee Suk Seo, Tae Ho Cho Modeling of Policy-Based Network with SVDB. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PBNM (Policy-based Network Management), simulation, Data Mining, network security, Security Policy, DEVS formalism
56Phu H. Phung, David Sands 0001 Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security policy enforcement, vehicle software, middleware, Aspect-oriented programming, OSGi, reference monitors
55James Bret Michael, Vanessa L. Ong, Neil C. Rowe Natural-Language Processing Support for Developing Policy-Governed Software Systems. Search on Bibsonomy TOOLS (39) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
54Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao A Network Security Policy Model and Its Realization Mechanism. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, Security policy, domain, rule engine
53Stephen S. Yau, Zhaoji Chen Security Policy Integration and Conflict Reconciliation for Collaborations among Organizations in Ubiquitous Computing Environments. Search on Bibsonomy UIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security policy integration, conflict reconciliation, organization collaboration, similarity-based policy adaptation, negotiation-based policy reconciliation, ontology, ubiquitous computing environments
52Patrick D. McDaniel, Atul Prakash Methods and limitations of security policy reconciliation. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security policy
52George Yee, Larry Korba Negotiated Security Policies for E-Services and Web Services. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Michael J. Petkac, Lee Badger Security Agility in Response to Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security agility, cooperative frameworks, malicious attacks, mission critical functionality, security policy reconfiguration, runtime security policy change, prototype toolkit, flexible host-based response, distributed systems, intrusion detection, distributed processing, software components, security of data
51Fumiko Satoh, Yumi Yamaguchi Generic Security Policy Transformation Framework for WS-Security. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Myla Archer, Elizabeth I. Leonard, Matteo Pradella Modeling Security-Enhanced Linux Policy Specifications for Analysis. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Vijay Varadharajan Network Security Policy Models. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
49Symon Chang, Qiming Chen, Meichun Hsu Managing Security Policy in a Large Distributed Web Services Environment. Search on Bibsonomy COMPSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49Geon Woo Kim 0001, So-Hee Park, Jaehoon Nah, Sung Won Sohn Security Policy Deployment in IPsec. Search on Bibsonomy ICOIN (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
49Frédéric Cuppens, Claire Saurel Specifying a security policy: a case study. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF high risk environment, interoperability problems, logic-based approach, formal specification, consistency, completeness, security of data, formal logic, deontic logic, security policy specification
49Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis An Ontology-Based Approach to Information Systems Security Management. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IS Security, Security Policy, Security Management, Security Ontology
47Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. Search on Bibsonomy POLICY The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
47Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia Enabling automated threat response through the use of a dynamic security policy. Search on Bibsonomy Journal in Computer Virology The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Mohamad Aljnidi, Jean Leneutre A security policy system for mobile autonomic networks. Search on Bibsonomy Autonomics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security policy management, ad-hoc networks, autonomic computing, security models, autonomic networks
46David F. Ferraiolo, Vijay Atluri A meta model for access control: why is it needed and is it even possible to achieve? Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46John P. McDermott, Leo Freitas A formal security policy for xenon. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF refinement, open-source, z, csp, hypervisor, information-flow security, circus
44Fuwen Liu, Hartmut König Security Policy Management for Peer Group Meetings. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe Maintaining Consistency of the Security Policy using Timestamp Ordering. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Performance, Concurrency control, Security policy, Consistency control, Timestamp ordering
44George Yee Personalized Security for E-Services. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Charles R. Young A security policy for a profile-oriented operating system. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
43Moon Sun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim, Jinoh Kim Applying Data Mining Techniques to Analyze Alert Data. Search on Bibsonomy APWeb The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Tejeddine Mouelhi, Franck Fleurey, Benoit Baudry, Yves Le Traon A Model-Based Framework for Security Policy Specification, Deployment and Testing. Search on Bibsonomy MoDELS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Model-driven engineering methodology, Security, Metamodeling
43Almut Herzog, Nahid Shahmehri A Usability Study of Security Policy Management. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Kouichi Ono, Yuichi Nakamura, Fumiko Satoh, Takaaki Tateishi Verifying the Consistency of Security Policies by Abstracting into Security Types. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Pierre-Alain Masson, Jacques Julliand, Jean-Chritophe Plessis, Eddie Jaffuel, Georges Debois Automatic generation of model based tests for a class of security properties. Search on Bibsonomy A-MOST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security policy, automatic test generation, security properties
43Petros Efstathopoulos, Eddie Kohler Manageable fine-grained information flow. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF decentralized information flow control, debugging, labels, policy language
43Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby Semantic context aware security policy deployment. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, network security, PDP, PEP
42Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga Security policy validation using temporal executable specifications. Search on Bibsonomy SMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Security, Security Policy, Firewalls, Anomalies, Packet Filters
41Laurent George 0002, Valérie Viet Triem Tong, Ludovic Mé Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Igor V. Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov Hybrid Multi-module Security Policy Verification. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Raj Mohan, Timothy E. Levin, Cynthia E. Irvine An Editor for Adaptive XML-Based Policy Management of IPsec. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Nils Gruschka, Meiko Jensen, Torben Dziuk Event-based application of ws-security policy on soap messages. Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF event-based processing, web services, WS-security
40Gustavo A. Santana Torrellas A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Xiaodong Yi, Xuejun Yang A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Information Flow Security Policy, Security Verification, Secure Operating System
39Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan A Novel Quantitative Approach For Measuring Network Security. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Teo Poh Kuang, Hamidah Ibrahim Security privacy access control for policy integration and conflict reconciliation in health care organizations collaborations. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conflict reconciliation, cross-organization collaboration, security policy integration, role-based access control, logical reasoning
39Patrick D. McDaniel, Atul Prakash Methods and Limitations of Security Policy Reconciliation. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Heng Yin, Haining Wang Building an application-aware IPsec policy system. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IP, computer network security, communication system security
39Klaus Peter Fischer, Udo Bleimann, Steven Furnell Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Business Process Execution Language (BPEL), Grid Processes, Security Policy Enforcement, Virtual Organizations, Grid Services, Information Flow Analysis
39Patrick D. McDaniel, Atul Prakash A Flexible Architecture for Security Policy Enforcement. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Xuhui Ao, Naftaly H. Minsky Flexible Regulation of Distributed Coalitions. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed coalition, Decentralized regulatory mechanism, Policy hierarchy, Policy interoperability, Security policy, Law-Governed Interaction
38George Angelis, Stefanos Gritzalis, Costas Lambrinoudakis Security Policy Configuration Issues in Grid Computing Environments. Search on Bibsonomy SAFECOMP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Sid Stamm, Brandon Sterne, Gervase Markham Reining in the web with content security policy. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF content restrictions, security policy, http, web security
38Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono Simplifying security policy descriptions for internet servers in secure operating systems. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF policy description, SELinux, internet server, secure operating system
38Rudolf Schreiner, Ulrich Lang Protection of complex distributed systems. Search on Bibsonomy Middleware Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF service oriented architecture, distributed systems security, model driven security
38Christos Fragos, Maria Karyda, Evangelos A. Kiountouzis Using the Lens of Circuits of Power in Information Systems Security Management. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information systems security management, Circuits of Power Framework, power, security policy
37Sharman Lichtenstein Developing Internet Security Policy for Organizations. Search on Bibsonomy HICSS (4) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
37Aneta Poniszewska-Maranda Security Constraints in Access Control of Information System Using UML Language. Search on Bibsonomy WETICE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Laurence Cholvy, Frédéric Cuppens Analyzing Consistency of Security Policies. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security policy consistency analysis, deontic formulae, normative conflicts, role priorities, methodology, problem solving, roles, formal language, security of data, regulation, formal logic
37Michael Manley, Cheri McEntee, Anthony Molet, Joon S. Park Towards an Effective Wireless Security Policy for Sensitive Organizations. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Peter Herrmann Formal Security Policy Verification of Distributed Component-Structured Software. Search on Bibsonomy FORTE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Matthias Schwan An extended model of security policy for multi-applicative smart cards. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF biometrics, smart cards, security policy, electronic signatures
37Anu Singh, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren Security policy analysis using deductive spreadsheets. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SELinux policy, security policy analysis, vulnerability analysis
37Rodolphe Ortalo A Flexible Method for Information System Security Policy Specification. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF information systems, deontic logic, security policy specification
36Mahdi Seify New Method for Risk Management in CRM Security Management. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Information Security Management System (ISMS), Data management, Risk Management, Customer Relationship Management (CRM)
36Patrick C. K. Hung, Guang-Sha Qui Implementing conflict of interest assertions in WS-policy with separation of duties for Web-Services matchmaking process. Search on Bibsonomy Inf. Syst. E-Business Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Matchmaking process, Separation of duties, Conflict of interest, WS-policy, Chinese wall security policy
36Patrick C. K. Hung, Guang-Sha Qiu Implementing Conflict of Interest Assertions for Web Services Matchmaking Process. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF WS-PolicyAttachment, Matchmaking, Conflict of interest, WS-Policy, Service locators, Chinese wall security policy
36Geon Woo Kim 0001, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim Security Framework for Home Network: Authentication, Authorization, and Security Policy. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Authentication, Access Control, Authorization, Security Policy, Home Network
36Sook-Yeon Kim, Myung-Eun Kim, Kiyoung Kim, Jongsoo Jang Information Model for Policy-Based Network Security Management. Search on Bibsonomy ICOIN (1) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Satoru Tezuka, Ryôichi Sasaki, Masanori Kataoka Seamless Object Authentication in Different Security Policy Domains. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36M. Nash, R. J. Kennett Implementing Security Policy in a Large Defense Procurement. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
36William R. Claycomb, Rodrigo Lopes, Dongwan Shin, Byunggi Kim A group-based security policy for wireless sensor networks. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless sensor network, access control, security policy
36Sachoun Park, Gihwon Kwon Verification of UML-Based Security Policy Model. Search on Bibsonomy ICCSA (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Formal verification, Role-based access control, Visual specification, Security policy model
36Ross J. Anderson A Security Policy Model for Clinical Information Systems. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1996 DBLP  DOI  BibTeX  RDF personal health information protection, medical ethics, privacy threats, restricted user numbers, restricted record numbers, strong notification property enforcement, localized information exposure, private banking, intelligence data management, security of data, data privacy, medical information systems, information flow control, DP management, clinical information systems, security policy model
36Minji Kim, Younghee Lee TDM: Enforcement of Security Management System for XML-Centric Electronic Commerce. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Boniface Hicks, Kiyan Ahmadizadeh, Patrick D. McDaniel From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Thomas Hardjono, Hugh Harney Group Security Policy Management for IP Multicast and Group Security. Search on Bibsonomy NETWORKING The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Subhendu Aich, Shamik Sural, Arun K. Majumdar Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Spatiotemporal event, Policy connectives, Location hierarchy, RBAC
35Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith Pastures: Towards Usable Security Policy Engineering. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Kuong-Ho Chen, Yuan-Siao Liu, Tzong-Jye Liu, Chyi-Ren Dow ZERO-Conflict: A Grouping-Based Approach for Automatic Generation of IPSec/VPN Security Policies. Search on Bibsonomy DSOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IP security, network management, security policy, security requirement, policy conflict
35Handan Çalikli, Ufuk Gül Çaglayan A Formal Policy Specification Language for an 802.11 WLAN with Enhanced Security Network. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Administrative Domain, 802.11 Wireless Local Area Network (WLAN), Mobadtl, Security Policy
35Manfred Holzbach Security Measures For The Austrian "Paychip" Electronic Purse Application. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF PAYCHIP, management-oriented description, Austrian nationwide electronic purse scheme, QUICK scheme, national security policy, security level evaluation, payment security maintenance, chip-card based payment infrastructure, Europay Austria, security of data, design principles, security measures
34Ninghui Li, Qihua Wang Beyond separation of duty: An algebra for specifying high-level security policies. Search on Bibsonomy J. ACM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Access control, separation of duty, policy design
34A. Murali M. Rao Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith Design and Implementation of Virtual Private Services. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Klaus Peter Fischer, Udo Bleimann, Woldemar F. Fuhrmann, Steven Furnell Security Policy Enforcement in BPEL-Defined Collaborative Business Processes. Search on Bibsonomy ICDE Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Anirban Sengupta, Mridul Sankar Barik Towards a Formal Specification Method for Enterprise Information System Security. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Lu'ay A. Wahsheh, Jim Alves-Foss Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1108 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license