-
1
-
-
33748570319
-
On the relationship of privacy and secure remote logging in dynamic systems
-
SEC, Springer
-
R. Accorsi. On the relationship of privacy and secure remote logging in dynamic systems. In SEC, volume 201 of IFIP, pages 329-339. Springer, 2006.
-
(2006)
IFIP
, vol.201
, pp. 329-339
-
-
Accorsi, R.1
-
3
-
-
34447536428
-
Analyzing multiple logs for forensic evidence
-
A. R. Arasteh, M. Debbabi, A. Sakha, and M. Saleh. Analyzing multiple logs for forensic evidence. Digital Investigation, 4:82-91, 2007.
-
(2007)
Digital Investigation
, vol.4
, pp. 82-91
-
-
Arasteh, A.R.1
Debbabi, M.2
Sakha, A.3
Saleh, M.4
-
9
-
-
21144438590
-
Using the event calculus for tracking the normative state of contracts
-
A. D. H. Farrell, M. J. Sergot, M. Sallé, and C. Bartolini. Using the event calculus for tracking the normative state of contracts. International Journal of Cooperative Information Systems (IJCIS), 14(2-3):99-129, 2005.
-
(2005)
International Journal of Cooperative Information Systems (IJCIS)
, vol.14
, Issue.2-3
, pp. 99-129
-
-
Farrell, A.D.H.1
Sergot, M.J.2
Sallé, M.3
Bartolini, C.4
-
10
-
-
77954728672
-
Rigorous development of automated inconsistency checks for digital evidence using the B method
-
P. Gladyshev and A. Enbacka. Rigorous development of automated inconsistency checks for digital evidence using the B method. International Journal of Digital Evidence (IJDE), 6(2):1-21, 2007.
-
(2007)
International Journal of Digital Evidence (IJDE)
, vol.6
, Issue.2
, pp. 1-21
-
-
Gladyshev, P.1
Enbacka, A.2
-
11
-
-
38749096258
-
Compliance checking between business processes and business contracts
-
IEEE Computer Society
-
G. Governatori, Z. Milosevic, and S. W. Sadiq. Compliance checking between business processes and business contracts. In EDOC, pages 221-232. IEEE Computer Society, 2006.
-
(2006)
EDOC
, pp. 221-232
-
-
Governatori, G.1
Milosevic, Z.2
Sadiq, S.W.3
-
15
-
-
33745641592
-
Flexible encoding of mathematics on the computer
-
MKM
-
F. Kamareddine, M. Maarek, and J. B. Wells. Flexible encoding of mathematics on the computer. In MKM, volume 3119 of LNCS, pages 160-174, 2004.
-
(2004)
LNCS
, vol.3119
, pp. 160-174
-
-
Kamareddine, F.1
Maarek, M.2
Wells, J.B.3
-
16
-
-
67650682101
-
A formal privacy management framework
-
FAST
-
D. Le Métayer. A formal privacy management framework. In FAST, volume 5491 of LNCS, pages 162-176, 2009.
-
(2009)
LNCS
, vol.5491
, pp. 162-176
-
-
Le Métayer, D.1
-
17
-
-
77954736143
-
Les clauses limitatives de responsabilité et de garantie dans les contrats informatiques. Approche comparative France/États-Unis. Quelles limitations
-
May
-
S. Lipovetsky. Les clauses limitatives de responsabilité et de garantie dans les contrats informatiques. Approche comparative France/États-Unis. Quelles limitations. Expertises des systèmes d'information, no 237, pages 143-148, May 2000.
-
(2000)
Expertises des Systèmes d'Information
, Issue.237
, pp. 143-148
-
-
Lipovetsky, S.1
-
18
-
-
84973491099
-
Software reliability and dependability: A roadmap
-
ACM
-
B. Littlewood and L. Strigini. Software reliability and dependability: a roadmap. In ICSE - Future of SE Track, pages 175-188, ACM, 2000.
-
(2000)
ICSE - Future of SE Track
, pp. 175-188
-
-
Littlewood, B.1
Strigini, L.2
-
19
-
-
0042154177
-
Model-based system monitoring and diagnosis of failures using statecharts and fault trees
-
Y. Papadopoulos. Model-based system monitoring and diagnosis of failures using statecharts and fault trees. Reliability Engineering and System Safety, 81:325-341, 2003.
-
(2003)
Reliability Engineering and System Safety
, vol.81
, pp. 325-341
-
-
Papadopoulos, Y.1
-
20
-
-
65349177152
-
Security benchmarks of OSGi platforms: Toward hardened OSGi
-
P. Parrend and S. Frénot. Security benchmarks of OSGi platforms: toward hardened OSGi. Software - Practice and Experience (SPE), 39(5):471-499, 2009.
-
(2009)
Software - Practice and Experience (SPE)
, vol.39
, Issue.5
, pp. 471-499
-
-
Parrend, P.1
Frénot, S.2
-
21
-
-
33745615461
-
Principles-driven forensic analysis
-
S. P. Peisert, S. Karin, M. Bishop, and K. Marzullo. Principles-driven forensic analysis. In Workshop on New security paradigms (NSPW), pages 85-93, 2005.
-
(2005)
Workshop on New Security Paradigms (NSPW)
, pp. 85-93
-
-
Peisert, S.P.1
Karin, S.2
Bishop, M.3
Marzullo, K.4
-
22
-
-
33750488796
-
How to write a financial contract
-
Cornerstones of Computing, chapter 6
-
S. L. Peyton Jones and J.-M. Eber. How to write a financial contract. In The Fun of Programming, Cornerstones of Computing, chapter 6. 2003.
-
(2003)
The Fun of Programming
-
-
Peyton Jones, S.L.1
Eber, J.-M.2
-
23
-
-
77954717857
-
IDD: Integrating diagnosis in the design of automotive systems
-
C. Picardi, R. Bray, F. Cascio, L. Console., P. Dague, O. Dressler, D. Millet, B. Rhefus., P. Struss and C. Vallée. IDD: integrating diagnosis in the design of automotive systems. In European Conference on Artificial Intelligence (ECAI), pages 628-632, 2002.
-
(2002)
European Conference on Artificial Intelligence (ECAI)
, pp. 628-632
-
-
Picardi, C.1
Bray, R.2
Cascio, F.3
Console, L.4
Dague, P.5
Dressler, O.6
Millet, D.7
Rhefus, B.8
Struss, P.9
Vallée, C.10
-
24
-
-
37149021163
-
A formal language for electronic contracts
-
FMOODS, Springer
-
C. Prisacariu and G. Schneider. A formal language for electronic contracts. In FMOODS, volume 4468 of LNCS, pages 174-189. Springer, 2007.
-
(2007)
LNCS
, vol.4468
, pp. 174-189
-
-
Prisacariu, C.1
Schneider, G.2
-
26
-
-
33646162634
-
A temporal logic-based model for forensic investigation in networked system security
-
S. Rekhis and N. Boudriga. A temporal logic-based model for forensic investigation in networked system security. Computer Network Security, 3685:325-338, 2005.
-
(2005)
Computer Network Security
, vol.3685
, pp. 325-338
-
-
Rekhis, S.1
Boudriga, N.2
-
27
-
-
3042744350
-
Two views on security and software liability. Let the legal system decide
-
January-February
-
D. J. Ryan. Two views on security and software liability. Let the legal system decide. IEEE Security and Privacy, January-February, 2003.
-
(2003)
IEEE Security and Privacy
-
-
Ryan, D.J.1
-
30
-
-
4544298452
-
Precise service level agreements
-
IEEE
-
J. Skene, D. D. Lamanna, and W. Emmerich. Precise service level agreements. In ICSE, pages 179-188. IEEE, 2004.
-
(2004)
ICSE
, pp. 179-188
-
-
Skene, J.1
Lamanna, D.D.2
Emmerich, W.3
-
31
-
-
34748896011
-
The monitorability of service-level agreements for application-service provision
-
ACM
-
J. Skene, A. Skene, J. Crampton, and W. Emmerich. The monitorability of service-level agreements for application-service provision. In International Workshop on Software and Performance (WOSP), pages 3-14. ACM, 2007.
-
(2007)
International Workshop on Software and Performance (WOSP)
, pp. 3-14
-
-
Skene, J.1
Skene, A.2
Crampton, J.3
Emmerich, W.4
-
33
-
-
3042553947
-
Modeling of post-incident root cause analysis
-
P. Stephenson. Modeling of post-incident root cause analysis. Digital Evidence, 2(2), 2003.
-
(2003)
Digital Evidence
, vol.2
, Issue.2
-
-
Stephenson, P.1
-
34
-
-
70349671532
-
The inference validity problem in legal discovery
-
IEEE
-
R. E. K. Stirewalt, L. K. Dillon, and E. Kraemer. The inference validity problem in legal discovery. In ICSE Companion, pages 303-306. IEEE, 2009.
-
(2009)
ICSE Companion
, pp. 303-306
-
-
Stirewalt, R.E.K.1
Dillon, L.K.2
Kraemer, E.3
|