|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2260 occurrences of 1247 keywords
|
|
|
Results
Found 3573 publication records. Showing 3573 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi |
Execution monitoring enforcement for limited-memory systems. |
PST |
2006 |
DBLP DOI BibTeX RDF |
bounded history automata, enforcement mechanisms, locally-testable properties, security policies, execution monitoring, edit automata |
54 | Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier |
Enforcement monitoring wrt. the safety-progress classification of properties. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
runtime enforcement, safety-progress, monitor, synthesis, property |
54 | Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks |
Cross-tier, label-based security enforcement for web applications. |
SIGMOD Conference |
2009 |
DBLP DOI BibTeX RDF |
database programming, security enforcement, compilers, web applications, type systems |
54 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan |
Concurrent Enforcement of Usage Control Policies. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
Policy, System Management, Usage Control, Enforcement |
54 | Marco Casassa Mont, Robert Thyne |
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. |
Privacy Enhancing Technologies |
2006 |
DBLP DOI BibTeX RDF |
privacy-aware access control, obligation management, privacy, identity management, policy enforcement |
54 | Marco Casassa Mont, Robert Thyne |
Privacy policy enforcement in enterprises with identity management solutions. |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy, access control, identity management, policy enforcement |
54 | P. Greve, J. Hoffman, R. E. Smith |
Using Type Enforcement to Assure a Configurable Guard. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
type enforcement, configurable guard, guard systems, administrator configurable guard, input channel, connected output channel, assured processes, assurance arguments, operational guards, pipeline, electronic mail, electronic mail, trusted components |
53 | Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang |
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitrakos |
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions. |
ICWS |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne |
Domain and Type Enforcement Firewalls. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP |
48 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Joe Tullio, Elaine M. Huang, David Wheatley, Harry Zhang, Claudia V. S. Guerrero, Amruta Tamdoo |
Experience, adjustment, and engagement: the role of video in law enforcement. |
CHI |
2010 |
DBLP DOI BibTeX RDF |
ubiquitous computing, surveillance, qualitative studies, contextual inquiry, law enforcement, video technologies |
47 | Mahesh V. Tripunitara, Bogdan Carbunar |
Efficient access enforcement in distributed role-based access control (RBAC) deployments. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
access control, efficiency, bloom filter, enforcement |
47 | Wei-Tek Tsai, Xinyu Zhou, Xiao Wei 0001 |
A policy enforcement framework for verification and control of service collaboration. |
Inf. Syst. E Bus. Manag. |
2008 |
DBLP DOI BibTeX RDF |
Service-Oriented Architecture, Runtime verification, Policy enforcement, Dynamic collaboration |
47 | Phu H. Phung, David Sands 0001 |
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Security policy enforcement, vehicle software, middleware, Aspect-oriented programming, OSGi, reference monitors |
47 | Marc Rogers, K. Scarborough, K. Frakes, C. San Martin |
Survey of Law Enforcement Perceptions Regarding Digital Evidence. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
State and local law enforcement, prosecutors, judges, digital evidence |
46 | Fei Yan, Philip W. L. Fong |
Efficient IRM enforcement of history-based access control policies. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
distributed optimization protocol, history-based access control policies, language-based security, security automata, inlined reference monitors |
46 | Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Karl Klose |
From Formal Access Control Policies to Runtime Enforcement Aspects. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Kirk J. Nahra |
HIPAA Security Enforcement Is Here. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier |
Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Tamara Dahlgren |
Performance-Driven Interface Contract Enforcement for Scientific Components. |
CBSE |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Dickson K. W. Chiu, Shing-Chi Cheung, Sven Till |
A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Sandro Etalle, William H. Winsborough |
A posteriori compliance control. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
access control, trust management, policy enforcement |
40 | Jay Ligatti, Lujo Bauer, David Walker 0001 |
Run-Time Enforcement of Nonsafety Policies. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
monitoring, safety, Security policies, liveness, policy enforcement, security automata |
40 | Wei-Tek Tsai, Xinxin Liu, Yinong Chen, Raymond A. Paul |
Simulation Verification and Validation by Dynamic Policy Enforcement. |
Annual Simulation Symposium |
2005 |
DBLP DOI BibTeX RDF |
Automated Policy Specification and Enforcement, Simulation, Verification and Validation |
40 | Ning Jiang, Kien A. Hua, Mounir A. Tantaoui |
Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience. |
MWCN |
2004 |
DBLP DOI BibTeX RDF |
Collaboration enforcement, First-hand experience, Mobile Ad Hoc Network, Reputation |
40 | Kurt Maly, Ajay Gupta 0003, Bjorn Kvande, Irwin B. Levinstein, Ravi Mukkamala, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers |
A privilege management and enforcement system for distributed resource sharing. |
WETICE |
1996 |
DBLP DOI BibTeX RDF |
privilege management, enforcement system, distributed resource sharing, information based world, controlled access, delegated resource management, end user access, World Wide Web based interfaces, DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, Internet, access control, operating system, authorization, X Windows, distributed environment, unauthorized access, data manipulation |
39 | Christoph Sturm, Ela Hunt, Marc H. Scholl |
Distributed Privilege Enforcement in PACS. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Ruo Ando, Youki Kadobayashi, Yoichi Shinoda |
An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan |
Deriving Enforcement Mechanisms from Policies. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Jun Feng, Glenn S. Wasson, Marty Humphrey |
Resource usage policy expression and enforcement in grid computing. |
GRID |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Andreas Maierhofer, Theodosis Dimitrakos, Leonid Titkov, David Brossard |
Extendable and Adaptive Message-Level Security Enforcement Framework. |
ICNS |
2006 |
DBLP DOI BibTeX RDF |
|
37 | David W. Chadwick, Stijn F. Lievens |
Enforcing "sticky" security policies throughout a distributed application. |
Middleware Security |
2008 |
DBLP DOI BibTeX RDF |
application independent PEP, obligation enforcement, privacy policy enforcement, PDP, sticky policies |
35 | Dries Vanoverberghe, Frank Piessens |
A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language. |
FMOODS |
2008 |
DBLP DOI BibTeX RDF |
security policy enforcement, inline reference monitor |
35 | Nikhil Swamy, Brian J. Corcoran, Michael Hicks 0001 |
Fable: A Language for Enforcing User-defined Security Policies. |
SP |
2008 |
DBLP DOI BibTeX RDF |
verified enforcement, access control, information flow, provenance, Language-based security |
35 | Bob Breeden, Judie Mulholland |
Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
ICAC, internet crimes against children, proactive investigation, training, forensics, law enforcement |
35 | Susan Landau 0001 |
Security, Wiretapping, and the Internet. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
Communications Assistance for Law Enforcement Act (CALEA), security, VoIP, wiretapping |
35 | Jason Crampton |
Specifying and enforcing constraints in role-based access control. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
enforcement context, separation of duty constraint, role-based access control, authorization constraint |
35 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
A fine-grained access control system for XML documents. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
authorizations specification and enforcement, World Wide Web, Access control, XML documents |
34 | David F. Ferraiolo, Vijay Atluri |
A meta model for access control: why is it needed and is it even possible to achieve? |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Lu Yan, Nasser Abouzakhar, Hannan Xiao |
Multimodal security enforcement framework for wireless ad hoc networks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
malicious, security, trust, intrusion detection, framework, cooperative, multimodal, wireless ad hoc networks, incentive, selfish, enforcement |
34 | Anas Abou El Kalam, Yves Deswarte |
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. |
CRITIS |
2008 |
DBLP DOI BibTeX RDF |
Security policies and models, access control enforcement, security of critical infrastructures, runtime model checking |
34 | Javier Vázquez-Salceda, Sergio Álvarez-Napagao |
Using SOA Provenance to Implement Norm Enforcement in e-Institutions. |
COIN@AAMAS&AAAI |
2008 |
DBLP DOI BibTeX RDF |
norm enforcement, web services, MAS, SOA, architecture, monitoring, provenance, electronic institutions, SOA Governance |
34 | Zhiming Zhang, Weirong Jiang, Yibo Xue |
A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
cooperation enforcement, mesh network, trust model, PID |
34 | Jeongsoo Kim |
The impact of e-government on child support enforcement policy outcomes. |
DG.O |
2007 |
DBLP BibTeX RDF |
automated information system, child support enforcement, policy outcome measurement, e-government |
34 | Hsinchun Chen, Homa Atabakhsh, Alan Gang Wang, Siddharth Kaza, Chunju Tseng, Yuan Wang, Shailesh Joshi, Tim Petersen, Chuck Violette |
COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
border safety, identity matching, naïve bayes model, data mining, semi-supervised learning, mutual information, law enforcement, homeland security, intelligence and security informatics |
34 | Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu 0001, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette |
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. |
DG.O |
2005 |
DBLP BibTeX RDF |
identity matching, data mining, social network analysis, law enforcement, homeland security |
34 | Ramaswamy Chandramouli |
Enterprise access policy enforcement for applications through hybrid models and XSLT technologies. |
ICEC |
2004 |
DBLP DOI BibTeX RDF |
domain type enforcement (DTE), policy rules, role-based access control (RBAC), XML schema, XSLT, provisioning |
34 | Eladio Domínguez, Jorge Lloret, María Antonia Zapata |
Integrity Constraint Enforcement by Means of Trigger Templates. |
ADVIS |
2002 |
DBLP DOI BibTeX RDF |
Integrity constraint enforcement, Trigger generation, Trigger template, Active database systems |
34 | Robert Grimm 0001, Brian N. Bershad |
Separating access control policy, enforcement, and functionality in extensible systems. |
ACM Trans. Comput. Syst. |
2001 |
DBLP DOI BibTeX RDF |
access check, policy-neutral enforcement, protection domain transfer, Java, security policy, auditing, SPIN, extensible systems, protection domain |
34 | Peter Herrmann, Heiko Krumm |
Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications. |
ISCC |
2001 |
DBLP DOI BibTeX RDF |
security policy enforcement, trust information service, Software components, trust management, wrappers |
32 | Ehab Al-Shaer, Adel El-Atawy, Taghrid Samak |
Automated pseudo-live testing of firewall configuration enforcement. |
IEEE J. Sel. Areas Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Puneet Gupta, Scott D. Stoller |
Verification of Security Policy Enforcement in Enterprise Systems. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Zhengping Wu, Lifeng Wang |
An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Jianfeng Lu, Ruixuan Li 0001, Zhengding Lu, Jinwei Hu, Xiaopu Ma |
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
constraint, Separation-of-Duty, usage control |
32 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Dynamic Enforcement of Abstract Separation of Duty Constraints. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Nataliia Bielova, Fabio Massacci, Andrea Micheletti |
Towards Practical Enforcement Theories. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Thomas Scheffler, Stefan Geiß, Bettina Schnor |
An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu |
Security Enforcement Model for Distributed Usage Control. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter |
Policy enforcement and compliance proofs for Xen virtual machines. |
VEE |
2008 |
DBLP DOI BibTeX RDF |
virtual machines, trusted computing, integrity management |
32 | Osmar Marchi dos Santos, Andy J. Wellings |
Cost enforcement in the real-time specification for Java. |
Real Time Syst. |
2007 |
DBLP DOI BibTeX RDF |
Fault-tolerance, Model checking, Real-time specification for Java, Java programming language |
32 | Lu'ay A. Wahsheh, Jim Alves-Foss |
Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture. |
IRI |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Saeed Parsa, Morteza Damanafshan |
Seamless Secure Development of Systems: From Modeling to Enforcement of Access Control Policies. |
AICCSA |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Min Hong, Samuel W. J. Welch, John Trapp, Min-Hyung Choi |
Implicit Constraint Enforcement for Rigid Body Dynamic Simulation. |
International Conference on Computational Science (1) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Chris Vanden Berghe, Matthias Schunter |
Privacy Injector - Automated Privacy Enforcement Through Aspects. |
Privacy Enhancing Technologies |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Adam Barth, John C. Mitchell |
Enterprise privacy promises and enforcement. |
WITS |
2005 |
DBLP DOI BibTeX RDF |
policy summary, modal logic, privacy policy, P3P, EPAL |
32 | Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland |
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Andy J. Wellings, Gregory Bollella, Peter C. Dibble, David Holmes |
Cost Enforcement and Deadline Monitoring in the Real-Time Specification for Java. |
ISORC |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Min Hong, Samuel W. J. Welch, Min-Hyung Choi |
Intuitive Control of Dynamic Simulation Using Improved Implicit Constraint Enforcement. |
AsiaSim |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Steffen Jurk, Mira Balaban |
Improving Integrity Constraint Enforcement by Extended Rules and Dependency Graphs. |
DEXA |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai |
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Swarup Reddi |
Integrity Constraint Enforcement in the Functional Database Language PFL. |
BNCOD |
1993 |
DBLP DOI BibTeX RDF |
|
30 | Ali Alzahrani, Helge Janicke, Sarshad Abubaker |
Decentralized XACML Overlay Network. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
collaborative policy enforcement, decentralised policy enforcement, PDPs coordination |
29 | Mihnea Andrei, Xun Cheng, Sudipto Chowdhuri, Curtis Johnson, Edwin Seputis |
Ordering, distinctness, aggregation, partitioning and DQP optimization in sybase ASE 15. |
SIGMOD Conference |
2009 |
DBLP DOI BibTeX RDF |
abstract plans, distinctness, eager aggregation, lazy aggregation, logical operators, logical properties, physical operators, property enforcement, optimization, search engine, aggregation, grouping, ordering, search space, operator model, physical properties |
29 | Constantin Serban, Shmuel S. Tyszberowicz |
Enforcing Interaction Properties in AOSD-Enabled Systems. |
ICSEA |
2006 |
DBLP DOI BibTeX RDF |
Law-Governed Architecture, Architecture, Aspects, AOSD, Enforcement |
29 | Victoria Ungureanu |
Using certified policies to regulate E-commerce transactions. |
ACM Trans. Internet Techn. |
2005 |
DBLP DOI BibTeX RDF |
Contract terms, Scalability, Enforcement |
29 | Jeroen van Bemmel, Maarten Wegdam, Ko Lagerberg |
3PAC: Enforcing Access Policies for Web Services. |
ICWS |
2005 |
DBLP DOI BibTeX RDF |
Web Services security, policy enforcement, distributed access control |
29 | Habtamu Abie, Pål Spilling, Bent Foyn |
A distributed digital rights management model for secure information-distribution systems. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Self-protecting Objects, Privacy enforcement, Authentication, Authorization, Digital rights management |
29 | Moni Naor, Benny Pinkas |
Efficient Trace and Revoke Schemes. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation |
27 | Alexander Pretschner, Fabio Massacci, Manuel Hilty |
Usage Control in Service-Oriented Architectures. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang |
Secure information sharing enabled by Trusted Computing and PEI models. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
PEI models, secure information sharing, access control, authorization, trusted computing, security framework |
27 | Hyun-Jeong Kim, Dong Hoon Lee 0001, Moti Yung |
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Konstantin Beznosov |
Object Security Attributes: Enabling Application-Specific Access Control in Middleware. |
OTM |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Aaron G. Cass, Leon J. Osterweil |
Design Guidance through the Controlled Application of Constraints. |
IWSSD |
2000 |
DBLP BibTeX RDF |
|
27 | Deborah G. Johnson, Keith W. Miller 0001 |
Anonymity, pseudonymity, or inescapable identity on the net (abstract). |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
Internet |
27 | David J. Jankowski |
Computer-Aided Systems Engineering Methodology Support and Its Effect on the Output of Structured Analysis. |
Empir. Softw. Eng. |
1997 |
DBLP DOI BibTeX RDF |
computer-aided systems engineering, structured analysis, data flow diagram |
27 | Yair Frankel, Moti Yung |
On Characterization of Escrow Encryption Schemes. |
ICALP |
1997 |
DBLP DOI BibTeX RDF |
|
27 | Sören Preibusch |
Information Flow Control for Static Enforcement of User-Defined Privacy Policies. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
privacy policy enforcement, user-defined policies, JIF, privacy negotiations, electronic commerce, case-study, information flow control |
27 | Shashank Shanbhag, Tilman Wolf |
Enforcement of Data-Plane Policies in Next-Generation Networks. |
POLICY |
2010 |
DBLP DOI BibTeX RDF |
data-plane policy enforcement, network services, automated planning, packet processing, next-generation Internet |
27 | Matús Harvan, Alexander Pretschner |
State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
access control, operating systems, information flow, usage control, system calls, reference monitor, enforcement |
27 | Walter Chang, Brandon Streiff, Calvin Lin |
Efficient and extensible security enforcement using dynamic data flow analysis. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
security enforcement, static analysis, dynamic data flow analysis |
27 | David M. Eyers, Sriram Srinivasan 0002, Ken Moody, Jean Bacon |
Compile-Time Enforcement of Dynamic Security Policies. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
Kilim, Dynamic security constraints, compile-time security enforcement |
27 | Wei Zhou 0006, Christoph Meinel |
Function-Based Authorization Constraints Specification and Enforcement. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Access control, authorization constraints, constraints specification, constraints enforcement |
27 | Adrián Perreau de Pinninck, Carles Sierra, W. Marco Schorlemmer |
Friends no more: norm enforcement in multiagent systems. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
norm enforcement, ostracism, trust |
27 | Mahmoud Youssef, Nabil R. Adam, Vijayalakshmi Atluri |
Semantically enhanced enforcement of mobile consumer's privacy preferences. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
mobile consumer, semantic enforcement, privacy, incentive |
27 | Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette |
Visualization in law enforcement. |
CHI Extended Abstracts |
2005 |
DBLP DOI BibTeX RDF |
crime analysis, crime network, spatial and temporal visualization, social network analysis, law enforcement, association network |
27 | Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette |
Visualization in law enforcement. |
DG.O |
2005 |
DBLP BibTeX RDF |
crime analysis, crime network, spatial and temporal visualization, social network analysis, law enforcement, association network |
27 | Patrick C. K. Hung, Kamalakar Karlapalem |
A Paradigm for Security Enforcement in CapBasED-AMS. |
CoopIS |
1997 |
DBLP DOI BibTeX RDF |
security enforcement paradigm, CapBasED-AMS, capability-based event-driven activity management system, activity execution, problem-solving agent, multiple interdependent tasks, task execution, unauthorized modification, pilferage, illegal privacy violation, specification-time data, compile-time data, run-time data, system infrastructure, secure match-making, security constraints, task coordination model, security resource control, role-based resource security model, security policies, task scheduling, security of data, security threats, unauthorized access |
27 | Joshua D. Guttman |
Filtering Postures: Local Enforcement for Global Policies. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
filtering postures, global policy local enforcement, global network access control, optimal service, network topology, security policy, routers, authorisation, packet filtering, prototype implementation |
27 | Christoph F. Eick, Paul Werstein |
Rule-Based Consistency Enforcement for Knowledge-Based Systems. |
IEEE Trans. Knowl. Data Eng. |
1993 |
DBLP DOI BibTeX RDF |
rule-based consistency enforcement, exception handlers, consistency constraints, rule entities, activation pattern controlled rule, data integrity, knowledge-based systems, knowledge based systems, system performance, consistency checks, application programs, production rule, forward chaining, knowledge-base management system |
Displaying result #1 - #100 of 3573 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|