-
2
-
-
70449086305
-
On regular temporal logics with past
-
Berlin, Heidelberg, Germany: Springer-Verlag
-
Dax, C., Klaedtke, F., & Lange, M. (2009). On regular temporal logics with past. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming: Part ii (icalp). Berlin, Heidelberg, Germany: Springer-Verlag.
-
(2009)
Proceedings of the 36th International Colloquium on Automata, Languages and Programming: Part Ii (Icalp)
-
-
Dax, C.1
Klaedtke, F.2
Lange, M.3
-
3
-
-
84893317855
-
-
Finney, H. (2011). Privacy ca. Retrieved from http://www.privacyca.com
-
(2011)
Privacy Ca
-
-
Finney, H.1
-
7
-
-
38049040380
-
A policy language for distributed usage control
-
Hilty, M., Pretschner, A., Basin, D., Schaefer, C., & Walter, T. (2007). A policy language for distributed usage control. In Computer security (ESORIC 2007) (Vol. 4734).
-
(2007)
Computer Security (ESORIC 2007)
, vol.4734
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
8
-
-
57349136722
-
A general obligation model and continuity: Enhanced policy enforcement engine for usage control
-
Katt, B., Zhang, X., Breu, R., Hafner, M., & Seifert, J.-P. (2008). A general obligation model and continuity: enhanced policy enforcement engine for usage control. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies.
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
-
-
Katt, B.1
Zhang, X.2
Breu, R.3
Hafner, M.4
Seifert, J.-P.5
-
9
-
-
0020977639
-
Real-time programming and asynchronous message passing
-
New York, NY: ACM
-
Koymans, R., Vytopil, J., & de Roever, W. P. (1983). Real-time programming and asynchronous message passing. In Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing (PODC). New York, NY: ACM.
-
(1983)
Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing (PODC)
-
-
Koymans, R.1
Vytopil, J.2
De Roever, W.P.3
-
10
-
-
79952779062
-
Distributed data usage control for web applications: A social network implementation
-
Kumari, P., Pretschner, A., Peschla, J., & Kuhn, J. (2011). Distributed data usage control for web applications: A social network implementation. In Proceedings 1st ACM Conference on Data and Application Security and Privacy (CODASPY). Retrieved from http://www22.in.tum.de
-
(2011)
Proceedings 1st ACM Conference on Data and Application Security and Privacy (CODASPY)
-
-
Kumari, P.1
Pretschner, A.2
Peschla, J.3
Kuhn, J.4
-
11
-
-
0036044742
-
Temporal logic with forgettable past
-
Washington, DC: IEEE Computer Society
-
Laroussinie, F., Markey, N., & Schnoebelen, P. (2002). Temporal logic with forgettable past. In Proceedings of the 17th Annual IEEE Symposium on Logic in Computer Science (LICS). Washington, DC: IEEE Computer Society.
-
(2002)
Proceedings of the 17th Annual IEEE Symposium on Logic in Computer Science (LICS)
-
-
Laroussinie, F.1
Markey, N.2
Schnoebelen, P.3
-
12
-
-
67349182373
-
A brief account of runtime verification
-
doi:10.1016/j.jlap.2008.08.004
-
Leucker, M., & Schallhart, C. (2009). A brief account of runtime verification. Journal of Logic and Algebraic Programming, 78(5), 293-303. doi:10.1016/j.jlap.2008.08.004.
-
(2009)
Journal of Logic and Algebraic Programming
, vol.78
, Issue.5
, pp. 293-303
-
-
Leucker, M.1
Schallhart, C.2
-
13
-
-
57349177897
-
The power of events: An introduction to complex event processing in distributed enterprise systems
-
Springer. doi:10.1007/978-3-540-88808-6-2
-
Luckham, D. (2008). The power of events: An introduction to complex event processing in distributed enterprise systems. In Rule representation, interchange and reasoning on the web. Springer. doi:10.1007/978-3-540-88808-6-2.
-
(2008)
Rule Representation, Interchange and Reasoning on the Web
-
-
Luckham, D.1
-
15
-
-
84861235700
-
An overview of the mop runtime verification framework
-
Meredith, P. O., Jin, D., Griffith, D., Chen, F., & Rosu, G. (2011). An overview of the mop runtime verification framework. International Journal on Software Tools for Technology Transfer (STTT). Retrieved from http://fsl.cs.uiuc.edu
-
(2011)
International Journal on Software Tools for Technology Transfer (STTT)
-
-
Meredith, P.O.1
Jin, D.2
Griffith, D.3
Chen, F.4
Rosu, G.5
-
16
-
-
79961133763
-
Implementing trust in cloud infrastructures
-
Neisse, R., Holling, D., & Pretschner, A. (2011). Implementing trust in cloud infrastructures. In Proceedings of the 11th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, CCGRID 2011. Retrieved from http://www22.in.tum.de
-
(2011)
Proceedings of the 11th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, CCGRID 2011
-
-
Neisse, R.1
Holling, D.2
Pretschner, A.3
-
17
-
-
80455140355
-
A trustworthy usage control enforcement framework
-
Neisse, R., Pretschner, A., & Di Giacomo, V. (2011). A trustworthy usage control enforcement framework. In Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011). Retrieved from http://ricardo.neisse.name
-
(2011)
Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011)
-
-
Neisse, R.1
Pretschner, A.2
Di Giacomo, V.3
-
20
-
-
79952798543
-
Usage control enforcement with data flow tracking for x11
-
Pretschner, A., Buechler, M., Harvan, M., Schaefer, C., & Walter, T. (2009). Usage control enforcement with data flow tracking for x11. In Proceedings of the 5th International Workshop on Security and Trust Management (pp. 124-137).
-
(2009)
Proceedings of the 5th International Workshop on Security and Trust Management
, pp. 124-137
-
-
Pretschner, A.1
Buechler, M.2
Harvan, M.3
Schaefer, C.4
Walter, T.5
-
21
-
-
57849100172
-
Mechanisms for usage control
-
Pretschner, A., Hilty, M., Basin, D., Schaefer, C., & Walter, T. (2008). Mechanisms for usage control. In Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS).
-
(2008)
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
22
-
-
70349671755
-
Formal analyses of usage control policies
-
Pretschner, A., Ruesch, J., Schaefer, C., & Walter, T. (2009). Formal analyses of usage control policies. In Proceedings of the International Conference on Availability, Reliability and Security (ARES).
-
(2009)
Proceedings of the International Conference on Availability, Reliability and Security (ARES)
-
-
Pretschner, A.1
Ruesch, J.2
Schaefer, C.3
Walter, T.4
-
25
-
-
51849136554
-
Ponder2 - A policy environment for autonomous pervasive systems
-
June
-
Twidle, K., Lupu, E., Dulay, N., & Sloman, M. (2008, June). Ponder2 - A policy environment for autonomous pervasive systems. In Proceedings of the IEEE Workshop on Policies for Distributed Systems and Network (POLICY) (p. 245-246).
-
(2008)
Proceedings of the IEEE Workshop on Policies for Distributed Systems and Network (POLICY)
, pp. 245-246
-
-
Twidle, K.1
Lupu, E.2
Dulay, N.3
Sloman, M.4
|