-
1Academic Journal
المؤلفون: Hadeel T. El-Kassabi, Mohamed Adel Serhani, Mohammad M. Masud, Khaled Shuaib, Khaled Khalil
المصدر: Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-22 (2023)
مصطلحات موضوعية: Cloud, Cloud workflow, Security enforcement, Deep learning, Anomaly detection, Prediction, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2192-113X
-
2eBook
المؤلفون: O'Dea, Geoff, author
المصدر: Restructuring Plans, Creditor Schemes, and other Restructuring Tools, 2022, ill.
-
3Conference
المؤلفون: Settanni, Francesco, Zamponi, Alessandro, Basile, Cataldo
المساهمون: Settanni, Francesco, Zamponi, Alessandro, Basile, Cataldo
مصطلحات موضوعية: Intent-Based System, Security Enforcement, Policy Refinement, Kubernete, Cloud-Native, Software Networks, Cyber Threat Intelligence, STIX
وصف الملف: STAMPA
Relation: info:eu-repo/semantics/altIdentifier/isbn/979-8-3503-7536-7; ispartofbook:Proceedings of 2024 IEEE International Conference on Cyber Security and Resilience (CSR); 2024 IEEE International Conference on Cyber Security and Resilience (CSR); firstpage:321; lastpage:328; numberofpages:8; https://hdl.handle.net/11583/2993058; https://ieeexplore.ieee.org/document/10679397
-
4Conference
المؤلفون: Horcas Aguilera, José Miguel, Pinto, Mónica, Fuentes, Lidia
المساهمون: Universidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticos, European Union (UE), Ministerio de Economía y Competitividad (MINECO). España, Junta de Andalucía
مصطلحات موضوعية: Security enforcement, Security policies, Aspect-oriented programming, Software Product Lines
Relation: TrustBus 2014: 11th International Conference on Trust and Privacy in Digital Business (2014), pp. 106-118.; INTER-TRUST FP7-317731; TIN2012-34840; FamiWare P09-TIC-5231; MAGIC P12-TIC1814; https://link.springer.com/chapter/10.1007/978-3-319-09770-1_10; Cham, Switzerland; https://idus.us.es/handle//11441/111705
-
5Conference
المؤلفون: Horcas Aguilera, José Miguel, Pinto, Mónica, Fuentes, Lidia
المساهمون: Universidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticos, European Union (UE), Ministerio de Economía y Competitividad (MINECO). España, Junta de Andalucía
مصطلحات موضوعية: Security enforcement, Security policy, Aspect-oriented programming, Dynamicity
Relation: ECSA 2014: 8th European Conference on Software Architecture (2014), pp. 340-356.; INTER-TRUST FP7-317731; TIN2012-34840; FamiWare P09-TIC-5231; MAGIC P12-TIC1814; https://link.springer.com/chapter/10.1007/978-3-319-09970-5_29; Cham, Switzerland; https://idus.us.es/handle//11441/111660
-
6Conference
المؤلفون: Jangda, Abhinav, Mishra, Mohit, Baudry, Benoit
المساهمون: Indian Institute of Technology BHU Varanasi (IIT BHU), Diversity-centric Software Engineering (DiverSe), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-LANGAGE ET GÉNIE LOGICIEL (IRISA-D4), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
المصدر: Annual Conference on Privacy, Security and Trust ; https://inria.hal.science/hal-01382971 ; Annual Conference on Privacy, Security and Trust, Dec 2016, Auckland, New Zealand ; http://pst2016.unitec.ac.nz/
مصطلحات موضوعية: Software diversity, jit, Security Enforcement, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.4: Processors/D.3.4.1: Compilers, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
جغرافية الموضوع: Auckland, New Zealand
-
7Conference
المؤلفون: Sicari, Sabrina, Rizzardi, Alessandra, Coen-Porisini, Alberto, Alfredo Grieco, Luigi, Monteil, Thierry
المساهمون: Dipartimento di Scienze e Tecnologie Avanzate (DISTA), Università degli Studi del Piemonte Orientale - Amedeo Avogadro (UPO), Dipartimento di Scienze Chimiche e Geologiche Centro Grandi Strumenti and INSTM unit, Università degli Studi di Cagliari = University of Cagliari (UniCa), Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)
المصدر: International Workshop on Self-Aware Internet of Things (SELF-IOT 2015) ; https://hal.science/hal-01228303 ; International Workshop on Self-Aware Internet of Things (SELF-IOT 2015), Jul 2015, Grenoble, France. 6p
مصطلحات موضوعية: Internet of Things, OM2M, Security Enforcement, [INFO]Computer Science [cs]
Relation: hal-01228303; https://hal.science/hal-01228303; https://hal.science/hal-01228303/document; https://hal.science/hal-01228303/file/MI3_SELFIOT_ICAC.pdf
-
8
المؤلفون: Asensio, Rodrigo, Montes de Oca, Edgardo, Nguyen, Huu Nghia, La, Vinh Hoa, Nguyen, Manh Dung, Alemany, Pol, Vilalta, Ricard, Muñoz, Raul, Soussi, Wissem, Gür, Gürkan, Taleb, Tarik, Lefebvre, Vincent, Santinelli, Gianni, Pastor, Antonio, Ayed, Dhouha, Dangerville, Cyril, Porambage, Pawani, Benzaid, Chafika, Christopoulou, Maria, Ortiz, Jordi, Zarca, Alejandro M.
مصطلحات موضوعية: Trusted Execution Environment (TEE), Artificial Intelligence (AI) and Machine Learning (ML) Techniques, Moving Target Defense (MTD), Distributed Ledger Technologies (DLT), Cybersecurity, Security Service Level Agreements (SSLA), Policy Based Security Enforcement, Automation and Zero-Touch Management (ZSM), Cyber Threat Intelligence (CTI), Root-Cause Analysis (RCA), 5G networks
-
9Academic Journal
المؤلفون: Cooper, James C., Kobayashi, Bruce H.
المصدر: Michigan Technology Law Review
مصطلحات موضوعية: Federal Trade Commission (FTC), data security enforcement, reasonable security, strict liability, cyber insurance, data breaches, Information Security, Science and Technology Law
وصف الملف: application/pdf
Relation: https://repository.law.umich.edu/mtlr/vol28/iss2/3; https://repository.law.umich.edu/cgi/viewcontent.cgi?article=1041&context=mtlr
-
10Academic Journal
المؤلفون: Png, Ivan P. L., Wang, Chen-Yu, Wang, Qiu-Hong
المصدر: Journal of Management Information Systems, 2008 Oct 01. 25(2), 125-144.
URL الوصول: https://www.jstor.org/stable/40398719
-
11Academic Journal
المؤلفون: Brian J. Corcoran, Nikhil Swamy, Michael Hicks
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Categories and Subject Descriptors D.2.4 [Software Engineering, Software/Program Verification, C.2.4 [Distributed Systems, Client/server, H.2.0 [Database Management, General General Terms Security, Languages, Performance Keywords database programming, security enforcement, web applications
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.409.4003; http://research.microsoft.com/en-us/um/people/nswamy/papers/sigmod569-corcoran.pdf
-
12Academic Journal
المؤلفون: E. Damiani, S. Marrara, M. Fansi, A. Gabillon
المساهمون: E. Damiani, M. Fansi, A. Gabillon, S. Marrara
مصطلحات موضوعية: DFA, Security enforcement, XML, XPath, XUpdate, Settore INF/01 - Informatica
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000257566100006; volume:30; issue:6; firstpage:379; lastpage:389; journal:COMPUTER STANDARDS & INTERFACES; http://hdl.handle.net/2434/48355; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-44949110261
-
13Academic Journal
المؤلفون: Walter Chang, Calvin Lin
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: General Terms Reliability, Security, Verification Keywords Dynamic Data Flow Analysis, Security Enforcement, Static Analysis
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.2436; http://www.cs.utexas.edu/~shmat/courses/cs380s_fall08/ccs08-chang.pdf
-
14Conference
المؤلفون: Bobelin, Laurent, Toinard, Christian, Tran, Tuan, Moinard, Stéphane
المساهمون: Sécurité des Données et des Systèmes (SDS), Laboratoire d'Informatique Fondamentale d'Orléans (LIFO), Université d'Orléans (UO)-Institut National des Sciences Appliquées - Centre Val de Loire (INSA CVL), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université d'Orléans (UO)-Institut National des Sciences Appliquées - Centre Val de Loire (INSA CVL), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA), Université d'Orléans (UO)-Ecole Nationale Supérieure d'Ingénieurs de Bourges, Department of Mechanical Science and Engineering Urbana, University of Illinois at Urbana-Champaign Urbana (UIUC), University of Illinois System-University of Illinois System, Qual'Net, Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti
المصدر: 2017 International Conference on Software Engineering Research and Practice
https://hal.science/hal-01966672
2017 International Conference on Software Engineering Research and Practice, Jul 2017, Las Vegas, United States. pp.31-37
https://csce.ucmss.com/cr/books/2017/ConferenceReport?ConferenceKey=SERمصطلحات موضوعية: workflow, tests, validation, security enforcement, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]
جغرافية الموضوع: Las Vegas, United States
Relation: hal-01966672; https://hal.science/hal-01966672
الاتاحة: https://hal.science/hal-01966672
-
15
المؤلفون: Ibbad Hafeez, Samuel Marchal, Sasu Tarkoma, Nadarajah Asokan, Tommaso Frassetto, Markus Miettinen, Ahmad-Reza Sadeghi
المصدر: ICDCS
مصطلحات موضوعية: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Computer science, Network security, Overhead (engineering), Internet of Things, IoT security, Mobile computing, Vulnerability, Cloud computing, IoT SENTINEL, device identification, 02 engineering and technology, Computer security, computer.software_genre, IP networks, 0202 electrical engineering, electronic engineering, information engineering, Wireless, Wireless fidelity, Ports (Computers), ta113, business.industry, Firmware, threat mitigation, automated device-type identification, 020206 networking & telecommunications, Logic gates, security of data, Object recognition, Identification (information), Internet-of-Things, IoT network, device fingerprinting, Security, 020201 artificial intelligence & image processing, security enforcement, business, Cryptography and Security (cs.CR), computer, Protocols, Computer network
-
16
المؤلفون: Abhinav, Mohit Mishra, Benoit Baudry
المساهمون: Indian Institute of Technology [BHU Varanasi] (IIT BHU), Diversity-centric Software Engineering (DiverSe), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-LANGAGE ET GÉNIE LOGICIEL (IRISA-D4), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), LANGAGE ET GÉNIE LOGICIEL (IRISA-D4), CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Université de Bretagne Sud (UBS)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
المصدر: Annual Conference on Privacy, Security and Trust
Annual Conference on Privacy, Security and Trust, Dec 2016, Auckland, New Zealand
PSTمصطلحات موضوعية: Computer science, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, Real-time computing, jit, 0102 computer and information sciences, 02 engineering and technology, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE], computer.software_genre, JavaScript, 01 natural sciences, Software diversity, Global variable, Memory address, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], Constant (computer programming), 0202 electrical engineering, electronic engineering, information engineering, Overhead (computing), computer.programming_language, Security Enforcement, computer.file_format, Just-in-time compilation, 010201 computation theory & mathematics, Scripting language, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.4: Processors/D.3.4.1: Compilers, Operating system, 020201 artificial intelligence & image processing, Executable, computer
-
17Academic Journal
المؤلفون: YAVUZ, Hakan A
المصدر: Issue: 27 609-666 ; 1309-6826 ; Türkiye Adalet Akademisi Dergisi
مصطلحات موضوعية: Önleyici Gözaltı,Özgürlük ve Güvenlik Hakkı,Koruma Altına Alma ve Uzaklaştırma Tedbirleri,Kolluk., Preventive Detention,The Right of Freedom and Security,Enforcement Meausures of Protecting and Removing,Law-enforcement.
وصف الملف: application/pdf
-
18
المؤلفون: Aktug, Irem, Naliuka, Katsiaryna
المصدر: Science of Computer Programming. 74(1-2):2-12
مصطلحات موضوعية: Policy language, Security enforcement mechanisms, Runtime monitoring, Security frameworks, TECHNOLOGY, Information technology, Computer science, TEKNIKVETENSKAP, Informationsteknik, Datavetenskap, Datalogi
وصف الملف: print
-
19
المؤلفون: Tom Goovaerts, Wouter Joosen, Bart De Win
المساهمون: Massacci, Fabio, Piessens, Frank
المصدر: Electronic Notes in Theoretical Computer Science. 197:31-43
مصطلحات موضوعية: General Computer Science, Computer science, Distributed computing, Covert channel, Asset (computer security), Security policy, Computer security, computer.software_genre, Security information and event management, Security testing, Theoretical Computer Science, Security engineering, Information security management, Distributed System Security Architecture, distributed systems, Cloud computing security, Information security, Computer security model, security policies, Security service, Information security standards, Security through obscurity, Security convergence, Network security policy, security enforcement, computer, Computer Science(all), policy management
وصف الملف: application/pdf
-
20
المؤلفون: Katsiaryna Naliuka, Irem Aktug
المصدر: Electronic Notes in Theoretical Computer Science. 197:45-58
مصطلحات موضوعية: General Computer Science, Computer science, Formal semantics (linguistics), computer.software_genre, Security policy, Semantics, security automata, Theoretical Computer Science, Application lifecycle management, Language Of Temporal Ordering Specification, security policy, Formal language, Security frameworks, Programming language, Object language, ConSpec, Policy language, Specification language, Formal methods, Specification languages, Automaton, Semantics of logic, Programming language specification, Security enforcement mechanisms, Runtime monitoring, computer, Software, Computer Science(all)