-
1
-
-
11244281944
-
An introduction to the Web Services Policy Language (WSPL)
-
A. H. Anderson. An introduction to the Web Services Policy Language (WSPL). In POLICY '04, pages 189-192, 2004.
-
(2004)
POLICY '04
, pp. 189-192
-
-
Anderson, A.H.1
-
4
-
-
0003488008
-
-
S. K. Card, J. D. Mackinlay, and B. Shneiderman, editors. Morgan Kaufmann, San Francisco, California
-
S. K. Card, J. D. Mackinlay, and B. Shneiderman, editors. Readings in Information Visualization: Using Vision To Think. Morgan Kaufmann, San Francisco, California, 1999.
-
(1999)
Readings in Information Visualization: Using Vision to Think
-
-
-
5
-
-
0003925394
-
-
Prentice Hall, Upper Saddle River, NJ
-
G. Di Battista, P. Eades, R. Tamassia, and I. G. Tollis. Graph Drawing. Prentice Hall, Upper Saddle River, NJ, 1999.
-
(1999)
Graph Drawing
-
-
Di Battista, G.1
Eades, P.2
Tamassia, R.3
Tollis, I.G.4
-
6
-
-
4544373206
-
Graphviz and dynagraph - Static and dynamic graph drawing tools
-
J. Ellson, E. R. Gansner, L. Koutsofios, S. C. North, and G. Woodhull. Graphviz and dynagraph - static and dynamic graph drawing tools. Graph Drawing Software, 2003.
-
(2003)
Graph Drawing Software
-
-
Ellson, J.1
Gansner, E.R.2
Koutsofios, L.3
North, S.C.4
Woodhull, G.5
-
7
-
-
1642314751
-
Multi-protocol visualization: A tool demonstration
-
ACM Press
-
J. Hall, A. Moore, I. Pratt, and I. Leslie. Multi-protocol visualization: a tool demonstration. In Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research, pages 13-22. ACM Press, 2003.
-
(2003)
Proceedings of the ACM SIGCOMM Workshop on Models, Methods and Tools for Reproducible Network Research
, pp. 13-22
-
-
Hall, J.1
Moore, A.2
Pratt, I.3
Leslie, I.4
-
8
-
-
85180810679
-
Advanced client/server authentication in TLS
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. E. Seamons, and B. Smith. Advanced client/server authentication in TLS. In NDSS, 2002.
-
(2002)
NDSS
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
9
-
-
0036623872
-
A meta-study of algorithm visualization effectiveness
-
C. Hundhausen, D. Sarah, and J. Stasko. A meta-study of algorithm visualization effectiveness. Journal of Visual Languages and Computing, 13(3):259-290, 2002.
-
(2002)
Journal of Visual Languages and Computing
, vol.13
, Issue.3
, pp. 259-290
-
-
Hundhausen, C.1
Sarah, D.2
Stasko, J.3
-
10
-
-
2542424853
-
Pixel based visual mining of geo-spatial data
-
D. Keim, C. Panse, M. Sips, and S. North. Pixel based visual mining of geo-spatial data. Computers and Graphics, 28(3):327-344, 2004.
-
(2004)
Computers and Graphics
, vol.28
, Issue.3
, pp. 327-344
-
-
Keim, D.1
Panse, C.2
Sips, M.3
North, S.4
-
11
-
-
35248881970
-
Visual specifications of policies and their verification
-
M. Koch and F. Parisi-Presicce. Visual specifications of policies and their verification. In FASE 2003, pages 278-293, 2003.
-
(2003)
FASE 2003
, pp. 278-293
-
-
Koch, M.1
Parisi-Presicce, F.2
-
12
-
-
3543052334
-
First experiences using XACML for access control in distributed systems
-
October
-
M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shahi. First experiences using XACML for access control in distributed systems. In Proceedings of the ACM Workshop on XML Security 2003, pages 25-37, October 2003.
-
(2003)
Proceedings of the ACM Workshop on XML Security 2003
, pp. 25-37
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Kafura, D.4
Shahi, S.5
-
13
-
-
33749537642
-
Generating interactive protocol simulations and visualizations for learning environments
-
S. Papakosta and C. Burger. Generating interactive protocol simulations and visualizations for learning environments. In 4th Plenary Workshop for Cabernet Members, 2001.
-
(2001)
4th Plenary Workshop for Cabernet Members
-
-
Papakosta, S.1
Burger, C.2
-
14
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29, Number 2:38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
16
-
-
0003831064
-
-
J. Stasko, J. Domingue, M. H. Brown, and B. A. Price, editors. The MIT Press, Cambridge, Massachusetts
-
J. Stasko, J. Domingue, M. H. Brown, and B. A. Price, editors. Software Visualization: Programming as a Multimedia Experience. The MIT Press, Cambridge, Massachusetts, 1998.
-
(1998)
Software Visualization: Programming as a Multimedia Experience
-
-
-
19
-
-
13944272563
-
Combining visual and automated data mining for near-real-time anomaly detection and analysis in bgp
-
S. T. Teoh, K. Zhang, S.-M. Tseng, K.-L. Ma, and S. F. Wu. Combining visual and automated data mining for near-real-time anomaly detection and analysis in bgp. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC-2004), pages 35-44, 2004.
-
(2004)
Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC-2004)
, pp. 35-44
-
-
Teoh, S.T.1
Zhang, K.2
Tseng, S.-M.3
Ma, K.-L.4
Wu, S.F.5
-
20
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
A. Whitten and J. Tygar. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. In 8th Usenix security symposium, pages 169-184, 1999.
-
(1999)
8th Usenix Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.2
-
25
-
-
0034449542
-
PRUNES: An efficient and complete strategy for automated trust negotiation over the internet
-
T. Yu, X. Ma, and M. Winslett. PRUNES: an efficient and complete strategy for automated trust negotiation over the internet. In ACM Conference on Computer and Communications Security, pages 210-219, 2000.
-
(2000)
ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
|