|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 10474 occurrences of 3799 keywords
|
|
|
Results
Found 18116 publication records. Showing 18116 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
135 | Derek L. Eager, Edward D. Lazowska, John Zahorjan |
A Comparison of Receiver-Initiated and Sender-Initiated Adaptive Load Sharing. |
SIGMETRICS |
1985 |
DBLP DOI BibTeX RDF |
|
82 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
77 | Phillip Krueger, Niranjan G. Shivaratri |
Adaptive Location Policies for Global Scheduling. |
IEEE Trans. Software Eng. |
1994 |
DBLP DOI BibTeX RDF |
adaptive location policies, global scheduling algorithm, transfer policy, location policy, location policies, receiver-initiated, sender-initiated, symmetrically-initiated, system workload, search activities, short transfer latency, nonadaptive policies, system instability, scheduling, performance evaluation, distributed systems, load balancing, resource allocation, distributed processing, probability, load sharing, distributed scheduling, task migration, low overhead |
59 | James B. Cole, John Derrick, Zoran Milosevic, Kerry Raymond |
Author Obliged to Submit Paper before 4 July: Policies in an Enterprise Specification. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
ODP enterprise viewpoint, enterprise policies, formalising and refining policies, case study, delegation |
56 | I-Lung Kao, Randy Chow |
An Extended Capability Architecture To Enforce Dynamic Access Control Policies. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers |
54 | Shuo Tang, Chris Grier, Onur Aciiçmez, Samuel T. King |
Alhambra: a system for creating, enforcing, and testing browser security policies. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
web browser, web security, cross-site scripting |
50 | Scott J. Harmon, Scott A. DeLoach, Robby |
Trace-Based Specification of Law and Guidance Policies for Multi-Agent Systems. |
ESAW |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Danièle Beauquier, Dima Burago, Anatol Slissenko |
On the Complexity of Finite Memory Policies for Markov Decision Processes. |
MFCS |
1995 |
DBLP DOI BibTeX RDF |
|
50 | Emil Lupu, Morris Sloman |
Conflicts in Policy-Based Distributed Systems Management. |
IEEE Trans. Software Eng. |
1999 |
DBLP DOI BibTeX RDF |
Obligation policy, meta-policy, management roles, conflict resolution, authorization policy, policy conflict |
47 | Alan R. Peslak |
Privacy policies of the largest privately held companies: a review and analysis of the forbes private 50. |
CPR |
2005 |
DBLP DOI BibTeX RDF |
fair information practices, private companies, privately held companies, privacy policies |
47 | Feng Wang 0017, Lixin Gao 0001 |
On inferring and characterizing internet routing policies. |
Internet Measurement Conference |
2003 |
DBLP DOI BibTeX RDF |
BGP, traffic engineering, routing policies |
44 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture |
44 | Yongbing Zhang, Katsuya Hakozaki, Hisao Kameda, Kentaro Shimizu |
A performance comparison of adaptive and static load balancing in heterogeneous distributed systems. |
Annual Simulation Symposium |
1995 |
DBLP DOI BibTeX RDF |
heterogeneous distributed system model, processing capacities, job transfer, system state-information exchange, system loads, static policies, simulation, performance evaluation, resource allocation, virtual machines, delays, distributed processing, local area networks, local area networks, performance comparison, overheads, adaptive policies, heterogeneous distributed systems, adaptive load balancing, static load balancing |
44 | Eran Toch, Norman M. Sadeh, Jason I. Hong |
Generating default privacy policies for online social networks. |
CHI Extended Abstracts |
2010 |
DBLP DOI BibTeX RDF |
default policies, location sharing technology, privacy, information sharing, online social networks |
44 | Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyerovich, Michael Carl Tschantz |
Verification and change-impact analysis of access-control policies. |
ICSE |
2005 |
DBLP DOI BibTeX RDF |
verification, XACML, decision diagram, change-impact analysis, access-control policies |
44 | Mohamed Ganna, Eric Horlait |
On Using Policies for Managing Service Provisioning in Agent-Based Heterogeneous Environments for Mobile Users. |
POLICY |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Vahid R. Karimi, Donald D. Cowan |
Verification of Access Control Policies for REA Business Processes. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor |
A user study of the expandable grid applied to P3P privacy policy visualization. |
WPES |
2008 |
DBLP DOI BibTeX RDF |
expandable grid, privacy, user interface, policy, p3p |
41 | Fred B. Schneider |
Enforceable security policies. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
EM security policies, SASI, security policies, proof carrying code, safety properties, security automata, inlined reference monitors |
41 | Patricia Balbastre, Ismael Ripoll, Alfons Crespo |
Control tasks delay reduction under static and dynamic scheduling policies. |
RTCSA |
2000 |
DBLP DOI BibTeX RDF |
control task delay reduction, dynamic scheduling policy, static scheduling policy, control action delays, dynamic scheduling policies, data acquisition interval, control action interval, DAI, control design phase, scheduling, delays, control systems, industrial application, data acquisition, data acquisition, scheduling policies, static scheduling, control algorithms, EDF scheduling, industrial control, CAI, worst case response time, task decomposition, control performances, digital control |
41 | Simon N. Foley |
Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
secure canonical upgrade policies, multilevel secure object stores, multilevel relabel policies, high-level subjects, low-level security labels, message filter model, object-oriented database, security of data |
41 | Piero A. Bonatti, Fabio Mogavero |
Comparing Rule-Based Policies. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
Rule-based policies, Policy comparison, Policy-aware service selection, Policy compliance, Datalog query containment, Policy verification |
40 | Jay Ligatti, Lujo Bauer, David Walker 0001 |
Run-Time Enforcement of Nonsafety Policies. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
monitoring, safety, Security policies, liveness, policy enforcement, security automata |
40 | Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh |
Capturing Social Networking Privacy Preferences: Can Default Policies Help Alleviate Tradeoffs between Expressiveness and User Burden? |
Privacy Enhancing Technologies |
2009 |
DBLP DOI BibTeX RDF |
Mining default policies, Privacy, User modeling |
40 | Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Hossein Pedram, Mehdi Dehghan 0001, Masoud Sabaei |
A New Method for Creating Efficient Security Policies in Virtual Private Network. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
IPsec policies, security policy, security requirement, virtual private network |
40 | Lujo Bauer, Jay Ligatti, David Walker 0001 |
Composing security policies with polymer. |
PLDI |
2005 |
DBLP DOI BibTeX RDF |
composable security policies, run-time enforcement, security automata, program monitors, edit automata |
40 | Asit Dan, Philip S. Yu |
Performance Analysis of Buffer Coherency Policies in a Multisystem Data Sharing Environment. |
IEEE Trans. Parallel Distributed Syst. |
1993 |
DBLP DOI BibTeX RDF |
integrated analytic models, buffer coherency policies, multisystem data sharing environment, multisystem transaction processing environment, propagation oriented approaches, coherency messages, buffer hit probability, independent reference model, CPU overhead, performance evaluation, performance analysis, transaction processing, detection, shared memory systems, response time, simulation models, notification, maximum throughput |
40 | Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam |
Using Semantics for Policy-Based Web Service Composition. |
Distributed Parallel Databases |
2005 |
DBLP DOI BibTeX RDF |
Web services, workflow, composition, policies |
40 | Laura Bright, Avigdor Gal, Louiqa Raschid |
Adaptive pull-based policies for wide area data delivery. |
ACM Trans. Database Syst. |
2006 |
DBLP DOI BibTeX RDF |
Pull-based, update models, caching, data delivery |
40 | Jian Ni, Danny H. K. Tsang, Sekhar Tatikonda, Brahim Bensaou |
Threshold and reservation based call admission control policies for multiservice resource-sharing systems. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Ronald van der Lingen, André van der Hoek |
Dissecting Configuration Management Policies. |
SCM |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Prasad Naldurg, Roy H. Campbell, M. Dennis Mickunas |
Developing Dynamic Security Policies. |
DANCE |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Xuhui Ao, Naftaly H. Minsky, Thu D. Nguyen |
A Hierarchical Policy Specification Language and Enforcement Mechanism for Governing Digital Enterprises. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
39 | David F. Ferraiolo, Vijay Atluri |
A meta model for access control: why is it needed and is it even possible to achieve? |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Brian P. Kettler, Gary Edwards, Mark Hoffman |
Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Jennifer Golbeck, Aaron Mannes, James A. Hendler |
Semantic Web Technologies for Terrorist Network Analysis. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | |
Legal Standards for Data Mining. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Krishna R. Pattipati, Peter Willett 0001, Jefferey Allanach, Haiying Tu, Satnam Singh |
Hidden Markov Models and Bayesian Networks for Counter-Terrorism. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Janusz Marecki, Nathan Schurr, Milind Tambe |
Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran |
Analysis of Heterogeneous Data in Ultrahigh Dimensions. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, Erik S. Connors |
Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Seth Greenblatt, Thayne Coffman, Sherry Marcus |
Behavioral Network Analysis for Terrorist Detection. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna R. Pattipati, Stephen G. Eick, David Cousins, Michael Nicoletti |
Information Processing at Very High Speed Data Ingestion Rates. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Kim A. Taipale |
Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Mark Lazaroff, David Snowden |
Anticipatory Models for Counter-Terrorism. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Shuang Sun, Xiaocong Fan, John Yen |
Sharing Intelligence Using Information Supply Chains. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Douglas W. Oard |
Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Paul A. Kogut, Yui Leung, Kathleen Ryan, Linda Gohari, Mieczyslaw M. Kokar, Jerzy Letkowski |
Applying Semantic Web Reasoning to Counter-Terrorism. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Jeff Jonas, John Karat |
Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Aaron B. Frank, Desmond Saunders-Newton |
Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt |
Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Clifford Behrens, Hyong Sop Shim, Devasis Bassu |
Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | David B. Skillicorn |
Social Network Analysis Via Matrix Decompositions. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Nazli Choucri, Stuart E. Madnick, Michael D. Siegel |
Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Robert L. Popp, David Allen, Claudio Cioffi-Revilla |
Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
38 | Paul Rosenzweig |
Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
37 | Steffen Heinzl, Dominik Seiler, Ernst Juhnke, Bernd Freisleben |
Exposing validity periods of prices for resource consumption to web service users via temporal policies. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
temporal policies, web services, pricing, mashup, WS-Policies |
37 | Wolfgang A. Halang, Soon-Key Jung, Bernd J. Krämer |
Enforcing management policies in distributed systems. |
FTDCS |
1995 |
DBLP DOI BibTeX RDF |
management policies, formally definable management policies, platform independent management architecture, clerical management tasks, object-oriented class structure, rule execution, automated management tool invocation, automated policy management, object-oriented programming, resource allocation, open systems, processor scheduling, operating systems (computers), network operating systems, computer network management, production rules, open distributed systems, distributed systems management, middleware platforms |
37 | Randy Chow, I-Lung Kao |
Modeling complex access control policies in distributed systems. |
FTDCS |
1995 |
DBLP DOI BibTeX RDF |
access authorization, classified categories, state-dependent security, distributed systems, distributed processing, security policies, security of data, authorisation, access control model, access control policies, Boolean expressions |
37 | Dan Lin 0001, Prathima Rao, Elisa Bertino, Jorge Lobo 0001 |
An approach to evaluate policy similarity. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
XACML policies, policy similarity measure, access control policies |
37 | David W. Chadwick, Stijn F. Lievens |
Enforcing "sticky" security policies throughout a distributed application. |
Middleware Security |
2008 |
DBLP DOI BibTeX RDF |
application independent PEP, obligation enforcement, privacy policy enforcement, PDP, sticky policies |
37 | Wolfgang Mühlbauer, Steve Uhlig, Bingjie Fu, Mickael Meulle, Olaf Maennel |
In search for an appropriate granularity to model routing policies. |
SIGCOMM |
2007 |
DBLP DOI BibTeX RDF |
BGP, inter-domain routing, routing policies |
37 | Massimo Marchi, Alessandra Mileo, Alessandro Provetti |
Specification and Execution of Declarative Policies for Grid Service Selection. |
ECOWS |
2004 |
DBLP DOI BibTeX RDF |
Declarative Policies, Customization, Grid Services, User preferences, Answer Set Programming |
37 | Kim Todd, Tabatha Verbick, Merlin Miller |
Policies for the digital age campus. |
SIGUCCS |
2001 |
DBLP DOI BibTeX RDF |
privacy, information technology, policies, computing, e-mail |
37 | Xiao-Yu Hu, Pablo Rodriguez 0001, Ernst W. Biersack |
Performance Study of Satellite-Linked Web Caches and Filtering Policies. |
NETWORKING |
2000 |
DBLP DOI BibTeX RDF |
Satellite Distribution, Filtering Policies, World-Wide Web, Web Caching |
37 | Steven Davy, Brendan Jennings, John Strassner |
Using an Information Model and Associated Ontology for Selection of Policies for Conflict Analysis. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
Policy Conflict Analysis, Policy Selection |
36 | Knot Pipatsrisawat, Adnan Darwiche |
Width-Based Restart Policies for Clause-Learning Satisfiability Solvers. |
SAT |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor |
A Comparative Study of Online Privacy Policies and Formats. |
Privacy Enhancing Technologies |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Arie Orlovsky, Danny Raz |
Decentralized enforcement of security policies for distributed computational systems. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
security, distributed system, policy enforcment |
36 | Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie 0001 |
Conformance Checking of Access Control Policies Specified in XACML. |
COMPSAC (2) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Giovanni Russello, Changyu Dong, Naranker Dulay |
Authorisation and Conflict Resolution for Hierarchical Domains. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Adam Wierman |
On the effect of inexact size information in size based policies. |
SIGMETRICS Perform. Evaluation Rev. |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Chang-Woo Yang, Adam Wierman, Sanjay Shakkottai, Mor Harchol-Balter |
Tail asymptotics for policies favoring short jobs in a many-flows regime. |
SIGMETRICS/Performance |
2006 |
DBLP DOI BibTeX RDF |
many-sources, rate function, scheduling, large-deviations, SMART, SRPT, LAS |
36 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan, Kevin I. Jones |
A Compositional Event & Time-Based Policy Model. |
POLICY |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Wei Zhou 0006, Christoph Meinel, Vinesh H. Raja |
A Framework for Supporting Distributed Access Control Policies. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis |
A Knowledge-Based Repository Model for Security Policies Management. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu |
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Francesco Parisi-Presicce, Alexander L. Wolf |
Foundations for Software Configuration Management Policies Using Graph Transformations. |
FASE |
2000 |
DBLP DOI BibTeX RDF |
|
34 | P. R. Kumar 0001 |
Re-entrant lines. |
Queueing Syst. Theory Appl. |
1993 |
DBLP DOI BibTeX RDF |
thin film lines, re-entrant lines, buffer priority policies, due date policies, variance of delay, machine failures, set-up times, stability, queueing networks, scheduling policies, Manufacturing systems, semiconductor manufacturing, stochastic control, mean delay |
34 | Sruthi Bandhakavi, Charles C. Zhang, Marianne Winslett |
Super-sticky and declassifiable release policies for flexible information dissemination control. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
release policies, privacy, declassification, sticky policies |
34 | Lisandro Zambenedetti Granville, Gustavo Augusto Faraco de Sá Coelho, Maria Janilce Bosquiroli Almeida, Liane Margarida Rockenbach Tarouco |
An architecture for automated replacement of QoS policies. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
policy definition, policy of policies, meta-policies, policy replacement automation, policy-based network management |
34 | Yusen Lin, Sourav Bhattacharya |
Impact of rollback recovery to program locality of reference and page replacement policies. |
FTDCS |
1997 |
DBLP DOI BibTeX RDF |
page replacement policies, cache block replacement policies, fault-triggered rollback, simulation, fault tolerance, performance, memory management, checkpointing, research, system recovery, rollback recovery, locality of reference, fault propagation |
34 | Ing-Ray Chen, Sayed Atef Banawan |
Modeling and Analysis of Concurrent Maintenance Policies for Data Structures Using Pointers. |
IEEE Trans. Software Eng. |
1993 |
DBLP DOI BibTeX RDF |
concurrent maintenance policies, state reduction method, two-dimensional Markov model, one-dimensional Markov model, concurrent data structure maintenance policies, service time per operation, priority allocation functions, binary tree data structure, 1D Markov model, 2D Markov model, performance evaluation, performance analysis, data structures, software maintenance, Markov processes, tree data structures, pointers, closed form expression |
33 | Christer Magnusson, Louise Yngström |
Method for Insuring IT Risks. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
IT insurance method, IT insurance policies, estimated maximum IT loss, commercial and industrial security, risk management, security policies |
33 | Mor Armony, Nicholas Bambos |
Queueing Dynamics and Maximal Throughput Scheduling in Switched Processing Systems. |
Queueing Syst. Theory Appl. |
2003 |
DBLP DOI BibTeX RDF |
switched processing systems, cone policies, adaptive batching policies, trace-based modeling, dynamic scheduling, throughput maximization |
33 | Fei Yan, Philip W. L. Fong |
Efficient IRM enforcement of history-based access control policies. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
distributed optimization protocol, history-based access control policies, language-based security, security automata, inlined reference monitors |
33 | Laurent Vanbever, Bruno Quoitin, Olivier Bonaventure |
A hierarchical model for BGP routing policies. |
PRESTO |
2009 |
DBLP DOI BibTeX RDF |
network configuration, bgp, routing policies |
33 | John W. Stamey, Ryan A. Rossi |
Automatically identifying relations in privacy policies. |
SIGDOC |
2009 |
DBLP DOI BibTeX RDF |
latent relations, ambiguities, privacy policies |
33 | Brian S. Butler, Elisabeth Joyce, Jacqueline Pike |
Don't look now, but we've created a bureaucracy: the nature and roles of policies and rules in wikipedia. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
collaboration, community, policies, policy, wikis, dynamics, wikipedia, rules |
33 | Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori |
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
Fine-grained Security Policies, Workflow Monitoring, Business Processes |
33 | Johs Hansen Hammer, Gerardo Schneider |
On the Definition and Policies of Confidentiality. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
policies, confidentiality, norms |
33 | Kim-Phuong L. Vu, Vanessa Chambers, Fredrick P. Garcia, Beth Creekmur, John Sulaitis, Deborah Nelson, Russell Pierce, Robert W. Proctor |
How Users Read and Comprehend Privacy Policies. |
HCI (9) |
2007 |
DBLP DOI BibTeX RDF |
usability, eye-tracking, privacy policies, reading comprehension |
33 | Evan Martin, Tao Xie 0001 |
A fault model and mutation testing of access control policies. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
test generation, fault model, mutation testing, access control policies |
33 | Ian Welch, Fan Lu |
Policy-driven reflective enforcement of security policies. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
reflection, security policies |
33 | Bradley Simmons, Hanan Lutfiyya |
Policies, grids and autonomic computing. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
optimisation, resource management, policies, autonomic computing |
33 | Michael Katchabaw, Hanan Lutfiyya, Michael A. Bauer 0001 |
Administrative Policies to Regulate Quality of Service Management in Distributed Multimedia Applications. |
MMNS |
2003 |
DBLP DOI BibTeX RDF |
Administrative policies, QoS management |
33 | Hilla Atzmon, Roy Friedman, Roman Vitenberg |
Replacement Policies for a Distributed Object Caching Service. |
OTM |
2002 |
DBLP DOI BibTeX RDF |
CORBA, Cache Replacement Policies, Object Caching |
33 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan |
Concurrent Enforcement of Usage Control Policies. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
Policy, System Management, Usage Control, Enforcement |
33 | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala |
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Stuart G. Stubblebine, Rebecca N. Wright |
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. |
IEEE Trans. Software Eng. |
2002 |
DBLP DOI BibTeX RDF |
authentication logic, recent-secure authentication, reasoning about time, authentication, formal methods, computer security, security policies, clock synchronization, revocation, security analysis, protocol analysis, distributed systems security |
Displaying result #1 - #100 of 18116 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|