|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 266 occurrences of 200 keywords
|
|
|
Results
Found 342 publication records. Showing 340 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
202 | Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz |
A framework for MLS interoperability. |
HASE |
1996 |
DBLP DOI BibTeX RDF |
MLS interoperability framework, distributed object oriented computing, location independence, MLS products, rigorous evaluation/certification procedures, security critical components, MLS architectural framework, security critical components/functions, secure use, parallel programming, software reuse, component based development, legacy systems, multilevel security, architectural framework, computing paradigm |
134 | Iwen E. Kang, Thomas F. Keefe |
Concurrency control for federated multilevel secure database systems. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
MLS database systems, federated MLS database, local database systems, global serializability, security, interoperation, distributed databases, concurrency control, concurrency control, transaction processing, transaction processing, open systems, security of data, federated, multilevel secure database systems |
132 | Indrakshi Ray, Wei Huang |
Event Detection in Multilevel Secure Active Databases. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
120 | Hasan M. Jamil |
Belief Reasoning in MLS Deductive Databases. |
SIGMOD Conference |
1999 |
DBLP DOI BibTeX RDF |
MLS database, beleif assertion, inheritance and overriding, reasoning, Datalog, deductive databases, CORAL |
116 | Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz |
An Architecture for Multilevel Secure Interoperability. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
multilevel secure interoperability architecture, commercial sector, cost effective high assurance multilevel security, small communities, high assurance secure solution, MLS architecture, commercial single level hardware, specialized security devices, MLS CORBA, NRL Pump, Starlight Interactive Link, MLS cooperative computing, distributed computing, standards, distributed processing, heterogeneous environments, computer systems, COTS components, security levels |
112 | Clark Weissman |
MLS-PCA: A High Assurance Security Architecture for Future Avionics. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
105 | Myong H. Kang, Brian J. Eppinger, Judith N. Froscher |
Tools to Support Secure Enterprise Computing. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Security, Workflow, Tool, Enterprise computing |
92 | Iván García-Magariño, Jorge J. Gómez-Sanz, Rubén Fuentes-Fernández |
An Evaluation Framework for MAS Modeling Languages Based on Metamodel Metrics. |
AOSE |
2008 |
DBLP DOI BibTeX RDF |
evaluation, multi-agent system, Metric, metamodel, modeling language |
87 | Alimuddin Mohammad, Alice Chen, Guijun Wang, Changzhou Wang, Rodolfo A. Santiago |
A Multi-Layer Security Enabled Quality of Service (QoS) Management Architecture. |
EDOC |
2007 |
DBLP DOI BibTeX RDF |
Multi-Layer Security (MLS), Quality of Service (QoS), Service Oriented Architecture (SOA) |
86 | Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje |
Secure Transaction Management Protocols for MLS/DDBMS. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
concurrency control, covert channel, Multilevel security, distributed database system, commit protocol |
86 | Yaron Lipman, Daniel Cohen-Or, David Levin |
Error bounds and optimal neighborhoods for MLS approximation. |
Symposium on Geometry Processing |
2006 |
DBLP DOI BibTeX RDF |
|
86 | Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky |
Closing the key loophole in MLS databases. |
SIGMOD Rec. |
2003 |
DBLP DOI BibTeX RDF |
|
86 | R. E. Niemeyer |
Using Web Technologies in Two MLS Environments: A Security Analysis. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks |
84 | Christel Calas |
GDoM: a Multilevel Document Manager. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
multilevel security (mls), mls application, mls document manager, mls Unix kernel, computer security |
82 | Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John Andrew Clark |
MLS security policy evolution with genetic programming. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
policy inference, genetic programming, security policy, MLS |
82 | Thomas F. Keefe, Wei-Tek Tsai |
A multiversion transaction scheduler for centralized multilevel secure database systems. |
HASE |
1996 |
DBLP DOI BibTeX RDF |
multiversion transaction scheduler, centralized multilevel secure database systems, multilevel secure database management systems, MLS/DBMSs, secure multiversion scheduling protocol, serializable schedules, MLS noninterference assertions, timestamp generation, concurrency, concurrency control, transactions, correctness, contention, failure, covert channels, data access, abstract model, concurrent execution, multiple versions |
74 | Hasan M. Jamil, Gillian Dobbie |
On Logical Foundations of Multilevel Secure Databases. |
J. Intell. Inf. Syst. |
2004 |
DBLP DOI BibTeX RDF |
MLS databases, belief assertion, inheritance and overriding, security, reasoning, deductive databases, declarative language, soundness and completeness |
74 | Hasan M. Jamil, Gillian Dobbie |
A Model Theoretic Semantics for Multi-level Secure Deductive Databases. |
ICLP |
2002 |
DBLP DOI BibTeX RDF |
MLS databases, belief assertion, security, reasoning, deductive databases, soundness and completeness |
73 | Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel |
A logical specification and analysis for SELinux MLS policy. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
policy compliance, SELinux, policy analysis, multi-level security |
60 | Christian Ledergerber, Gaël Guennebaud, Miriah D. Meyer, Moritz Bächer, Hanspeter Pfister |
Volume MLS Ray Casting. |
IEEE Trans. Vis. Comput. Graph. |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Hao Wang, Carlos Eduardo Scheidegger, Cláudio T. Silva |
Optimal bandwidth selection for MLS surfaces. |
Shape Modeling International |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Moses Garuba, Edward Appiah, Legand L. Burge III |
Performance Study of a MLS/DBMS Implemented as a Kernelized Architecture. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt |
A metadata calculus for secure information sharing. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
access control, risk management, information flow |
53 | Yongzhong Xing, Xiaobei Wu, Zhiliang Xu |
Multiclass Least Squares Wavelet Support Vector Machines. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Kaviraj Chopra, Sarma B. K. Vrudhula |
Efficient Symbolic Algorithms for Computing the Minimum and Bounded Leakage States. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Nirmal K. Bose, Nilesh A. Ahuja |
Superresolution and noise filtering using moving least squares. |
IEEE Trans. Image Process. |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Inja Youn, Csilla Farkas, Bhavani Thuraisingham |
Multilevel Secure Teleconferencing over Public Switched Telephone Network. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Sukhoon Kang, Yong-Rak Choi |
A Covert Timing Channel-Free Optimistic Concurrency Control Scheme for Multilevel Secure Database Management Systems. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Walid Rjaibi |
An introduction to multilevel secure relational database management systems. |
CASCON |
2004 |
DBLP BibTeX RDF |
|
53 | Nenad Jukic, Boris Jukic, Laurie Meamber, George S. Nezlek |
Improving E-business Customer Relationship Management Systems with Multilevel Secure Data Models. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
CRM Applications, Segmentation Theory, User Interface, Access Control, Knowledge Representation, E-business, Database Models |
46 | Álvaro E. Cuno Parari, Claudio Esperança, Antonio A. F. Oliveira |
Shape-sensitive MLS deformation. |
Vis. Comput. |
2009 |
DBLP DOI BibTeX RDF |
As-rigid-as-possible deformation, Animation, Moving least squares |
46 | Zhiying He, Xiaohui Liang |
A novel simplification algorithm based on MLS and Splats for point models. |
CGI |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Gianmauro Cuccuru, Enrico Gobbetti, Fabio Marton, Renato Pajarola, Ruggero Pintus |
Fast low-memory streaming MLS reconstruction of point-sampled surfaces. |
Graphics Interface |
2009 |
DBLP BibTeX RDF |
|
46 | Yaron Lipman, Daniel Cohen-Or, David Levin |
Data-dependent MLS for faithful surface approximation. |
Symposium on Geometry Processing |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Nenad Jukic, Susan V. Vrbsky |
Asserting Beliefs in MLS Relational Models. |
SIGMOD Rec. |
1997 |
DBLP DOI BibTeX RDF |
|
41 | Brant Hashii |
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
multilevel security (MLS), formal specification, network security, alloy, high assurance |
40 | William Wilson, Joel Sachs, David Wichers, Peter K. Boucher |
MLS and trust issues at the user interface in MLS AISs. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
39 | Mikael Onsjö, Osamu Watanabe 0001 |
Theory of Computing Systems (TOCS) Submission Version Finding Most Likely Solutions. |
Theory Comput. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Most-likely solution, Planted solution model, Average-case analysis, Message passing algorithm |
39 | Michel Sarkis, Christian T. Senft, Klaus Diepold |
A Novel Technique to Model the Variation of the Intrinsic Parameters of an Automatic Zoom Camera using Adaptive Delaunay Meshes Over Moving Least-Squares Surfaces. |
ICIP (5) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Jae Kyu Lee, Young J. Kim |
Haptic Rendering of Point Set Surfaces. |
WHC |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Osamu Watanabe 0001, Mikael Onsjö |
Finding Most Likely Solutions. |
CiE |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Navdeep Kaur, Rajwinder Singh, Anil Kumar Sarje, Manoj Misra |
Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Distributed database, concurrency control, covert channel, multilevel secure database system |
39 | Nina Amenta, Yong Joo Kil |
Defining point-set surfaces. |
ACM Trans. Graph. |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Yunheung Paek, Junsik Choi, Jinoo Joung, Junseo Lee, Seonwook Kim |
Exploiting Parallelism in Memory Operations for Code Optimization. |
LCPC |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Kaviraj Chopra, Sarma B. K. Vrudhula |
Implicit pseudo boolean enumeration algorithms for input vector control. |
DAC |
2004 |
DBLP DOI BibTeX RDF |
power, CMOS, SAT, binary decision diagrams, leakage, symbolic methods |
39 | José Ramón Quevedo, Elías F. Combarro, Antonio Bahamonde |
Choosing among Algorithms to Improve Accuracy. |
IWANN (1) |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krys J. Kochut, John A. Miller 0001 |
A Multilevel Secure Workflow Management System. |
CAiSE |
1999 |
DBLP DOI BibTeX RDF |
|
39 | Rae K. Burns, Yi-Fang Koh |
A Comparison of Multilevel Structured Query Language (SQL) Implementations. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
|
39 | Daniela Ponce, Martina Husáková, Tomás Nacházel, Vladimír Bures, Pavel Cech, Peter Mikulecký, Kamila Stekerová, Petr Tucník, Marek Zanker, Karel Mls, Ioanna Triantafyllou, Frantisek Babic |
Unification of tsunami-related terminology: Ontology engineering perspective. |
Comput. Geosci. |
2023 |
DBLP DOI BibTeX RDF |
|
39 | Pavel Cech, Daniela Ponce, Peter Mikulecký, Karel Mls, Andrea Zvácková, Petr Tucník, Tereza Otcenásková |
Generating Synthetic Data to Improve Intrusion Detection in Smart City Network Systems. |
MSPN |
2023 |
DBLP DOI BibTeX RDF |
|
39 | Frantisek Babic, Vladimír Bures, Pavel Cech, Martina Husáková, Peter Mikulecký, Karel Mls, Tomás Nacházel, Daniela Ponce, Kamila Stekerová, Ioanna Triantafyllou, Petr Tucník, Marek Zanker |
Review of Tools for Semantics Extraction: Application in Tsunami Research Domain. |
Inf. |
2022 |
DBLP DOI BibTeX RDF |
|
39 | Michal Dobrovolny, Karel Mls, Ondrej Krejcar, Sebastien Mambou, Ali Selamat |
Medical Image Data Upscaling with Generative Adversarial Networks. |
IWBBIO |
2020 |
DBLP DOI BibTeX RDF |
|
39 | Karel Mls, Richard Cimler, Ján Vascák, Michal Puheim |
Interactive evolutionary optimization of fuzzy cognitive maps. |
Neurocomputing |
2017 |
DBLP DOI BibTeX RDF |
|
39 | Vladimír Bures, Petr Tucník, Peter Mikulecký, Karel Mls, Petr Blecha |
Application of Ambient Intelligence in Educational Institutions: Visions and Architectures. |
Int. J. Ambient Comput. Intell. |
2016 |
DBLP DOI BibTeX RDF |
|
39 | Richard Cimler, Martin Gavalec, Karel Mls, Daniela Ponce |
Decision Support Biomedical Application Based on Consistent Optimization of Preference Matrices. |
ICCCI (2) |
2016 |
DBLP DOI BibTeX RDF |
|
39 | Richard Cimler, Karel Mls, Martin Gavalec |
Decision Support Smartphone Application Based on Interval AHP Method. |
ICCCI (2) |
2015 |
DBLP DOI BibTeX RDF |
|
39 | Martin Gavalec, Karel Mls, Hana Tomásková |
Optimization of the ordinal and cardinal consistency of a preference matrix in decision making. |
IFSA-EUSFLAT |
2015 |
DBLP BibTeX RDF |
|
39 | Karel Mls, Tereza Otcenásková |
Analysis of Complex Decisional Situations in Companies with the Support of AHP Extension of Vroom-Yetton Contingency Model. |
MIM |
2013 |
DBLP DOI BibTeX RDF |
|
39 | Richard Cimler, Karel Mls |
Intelligent House - Smart Living and Smart Workplace in Practical Approach. |
Intelligent Environments (Workshops) |
2013 |
DBLP DOI BibTeX RDF |
|
39 | Karel Mls, Jose L. Salmeron, Kamila Olsevicova, Martina Husáková |
Cognitive Personal Software Assistants within AmI Environment. |
AMIF |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Yvonne D. Gray, Elizabeth D. Liddy, Dale Sanders, Henry Small, Mls Ahip Kathy Moeller |
DataMining for healthcare professionals. Sponsored by SIG MED. |
ASIST |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens |
An Integrated Model for Access Control and Information Flow Requirements. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
DTE, RBAC, Security Policy, MLS, OrBAC |
35 | Richard E. Smith |
Mandatory Protection for Internet Server Software. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws |
33 | Jingyi Jin, Michael Garland, Edgar A. Ramos |
MLS-based scalar fields over triangle meshes and their application in mesh processing. |
SI3D |
2009 |
DBLP DOI BibTeX RDF |
geodesic path, scalar field design, mesh processing, scattered data interpolation, moving least squares |
33 | Heping Yan, Bing Liu 0009, Xiaoming Yang, Wei Wang 0009, Baile Shi, Genxing Yang |
Controlling FD and MVD Inferences in MLS. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Young-Hwan Oh, Hae-Young Bae |
MLS/SDM: Multi-level Secure Spatial Data Model. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Vlad Ingar Wietrzyk, Makoto Takizawa 0001, Vijay Varadharajan |
A Strategy for MLS Workflow. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Hao Wang, Carlos Eduardo Scheidegger, Cláudio T. Silva |
Bandwidth Selection and Reconstruction Quality in Point-Based Surfaces. |
IEEE Trans. Vis. Comput. Graph. |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Robert Berke, Mikael Onsjö |
Propagation Connectivity of Random Hypergraphs. |
SAGA |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Torben Amtoft, John Hatcliff, Edwin Rodríguez, Robby, Jonathan Hoag, David A. Greve |
Specification and Checking of Software Contracts for Conditional Information Flow. |
FM |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Nicholas Bonello, Sheng Chen 0001, Lajos Hanzo |
Multilevel Structured Low-Density Parity-Check Codes. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | André Schumacher, Pekka Orponen, Thorn Thaler, Harri Haanpää |
Lifetime Maximization in Wireless Sensor Networks by Distributed Binary Search. |
EWSN |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Michal Morawski |
Network based controller applied to a highly dynamic system. |
ETFA |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Iván García-Magariño |
Towards the Coexistence of Different Multi-Agent System Modeling Languages with a Powertype-Based Metamodel. |
DCAI |
2008 |
DBLP DOI BibTeX RDF |
powertype, software engineering, multi-agent systems, model-driven development, metamodel |
26 | Gaël Guennebaud, Markus H. Gross |
Algebraic point set surfaces. |
ACM Trans. Graph. |
2007 |
DBLP DOI BibTeX RDF |
moving least square surfaces, surface representation, point based graphics, sharp features |
26 | Noriko Takemura, Jun Miura |
View Planning of Multiple Active Cameras for Wide Area Surveillance. |
ICRA |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Bo-Chieh Liu, Ken-Huang Lin |
Error Analysis of the Distance and Distance Difference for SSSD-based Wireless Location: Part II-Experimental Results. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Bo-Chieh Liu, Ken-Huang Lin |
Error Analysis of the Distance and Distance Difference for SSSD-based Wireless Location: Part I-Theoretical Aspects. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Harri Haanpää, André Schumacher, Thorn Thaler, Pekka Orponen |
Distributed Computation of Maximum Lifetime Spanning Subgraphs in Sensor Networks. |
MSN |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Lei Xia, Wei Huang, Hao Huang |
A Compositional Multiple Policies Operating System Security Model. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege |
26 | Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger |
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Sumesh J. Philip |
On the scalability of multicast location service in mobile ad hoc networks. |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Bader Ali, Wilfred Villegas, Muthucumaru Maheswaran |
A trust based approach for protecting user data in social networks. |
CASCON |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Achraf Dhayni, Salvador Mir, Libor Rufer, Ahcène Bounceur |
Pseudorandom functional BIST for linear and nonlinear MEMS. |
DATE |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Sun-Jeong Kim, Chang Geun Song |
Rendering of Unorganized Points with Octagonal Splats. |
International Conference on Computational Science (2) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Libor Rufer, Salvador Mir, Emmanuel Simeu, C. Domingues |
On-Chip Pseudorandom MEMS Testing. |
J. Electron. Test. |
2005 |
DBLP DOI BibTeX RDF |
BIST, pseudorandom sequences, impulse response, MEMS testing |
26 | Anne Berry, Richard Krueger, Geneviève Simonet |
Ultimate Generalizations of LexBFS and LEX M. |
WG |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Soon-Jeong Ahn, Jaechil Yoo, Byung-Gook Lee, Joon-Jae Lee |
3D Surface Reconstruction from Scattered Data Using Moving Least Square Method. |
ICIAP |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Conrad Sanderson, Samy Bengio |
Statistical transformations of frontal models for non-frontal face verification. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Huafeng Liu 0003, Pengcheng Shi |
Discontinuity-Preserving Moving Least Squares Method. |
CIS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Indrakshi Ray |
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems. |
BNCOD |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Elisa Bertino, Barbara Catania, Elena Ferrari |
A nested transaction model for multilevel secure database management systems. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
multilevel secure database management systems, concurrency control, covert channels, Nested transactions |
26 | Kirsi Virrantaus, Jouni Markkula, Artem Garmash, Vagan Y. Terziyan, Jari Veijalainen, Artem Katasonov, Henry Tirri |
Developing GIS-Supported Location-Based Services. |
WISE (2) |
2001 |
DBLP DOI BibTeX RDF |
XML, GIS, Location-Based Services, Mobile Internet |
26 | Asa Elkins, Jeffery W. Wilson, Denis Gracanin |
Security issues in high level architecture based distributed simulation. |
WSC |
2001 |
DBLP DOI BibTeX RDF |
|
26 | John McHugh |
An Information Flow Tool for Gypsy. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee 0001 |
A Network Pump. |
IEEE Trans. Software Eng. |
1996 |
DBLP DOI BibTeX RDF |
security, information theory, flow control, router, Covert channel, gateway |
26 | Todd Fine |
Defining Noninterference in the Temporal Logic of Actions. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
noninterference properties, temporal logic of actions, multilevel secure systems, formal specification, formal methods, temporal logic, composition, security of data, covert channels, definitions, specification refinement |
26 | Xiaolei Qian |
View-Based Access Control with High Assurance. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
|
26 | Yonglak Sohn, Songchun Moon |
Tightly Secure Transaction Scheduler in Multi-Level Secure Database Management Systems |
DEXA |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Iwen E. Kang, Thomas F. Keefe |
On Transaction Processing for Multilevel Secure Replicated Databases. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
Global Transaction Manager, Transaction Processing, Multilevel Secure, Replicated Database |
Displaying result #1 - #100 of 340 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|