138 papers:
DAC-2015-McLaughlin #behaviour #policy- Blocking unsafe behaviors in control systems through static and dynamic policy enforcement (SM), p. 6.
SIGMOD-2015-UpadhyayaBS #automation #policy- Automatic Enforcement of Data Use Policies with DataLawyer (PU, MB, DS), pp. 213–225.
TACAS-2015-BloemKKW #runtime #synthesis- Shield Synthesis: — Runtime Enforcement for Reactive Systems (RB, BK, RK, CW), pp. 533–548.
PLDI-2015-JohnsonWMC #dependence #graph #security- Exploring and enforcing security guarantees via program dependence graphs (AJ, LW, SM, SC), pp. 291–302.
CHI-2015-RooksbyRMC #process- Pass the Ball: Enforced Turn-Taking in Activity Tracking (JR, MR, AM, MC), pp. 2417–2426.
ICEIS-v3-2015-Piedrabuena0R #data transformation- Enforcing Data Protection Regulations within e-Government Master Data Management Systems (FP, LG, RR), pp. 316–321.
POPL-2015-NgoMMP #black box #policy #runtime #security #source code- Runtime Enforcement of Security Policies on Black Box Reactive Programs (MN, FM, DM, FP), pp. 43–54.
REFSQ-2015-LiHM #requirements #security #specification- Analyzing and Enforcing Security Mechanisms on Requirements Specifications (TL, JH, JM), pp. 115–131.
SAC-2015-CharafeddineEFJ #component #runtime- Runtime enforcement for component-based systems (HC, KEH, YF, MJ), pp. 1789–1796.
SAC-2015-LabibPCG #approach #development #learning #product line #reuse- Enforcing reuse and customization in the development of learning objects: a product line approach (AEL, MCP, JHC, AG), pp. 261–263.
ESEC-FSE-2015-PrauseJ #gamification- Gamification for enforcing coding conventions (CRP, MJ), pp. 649–660.
ICSE-v2-2015-IzquierdoC #open source- Enabling the Definition and Enforcement of Governance Rules in Open Source Systems (JLCI, JC), pp. 505–514.
ASPLOS-2015-Sidiroglou-Douskos #automation #branch #integer #using- Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement (SSD, EL, NR, PP, FL, DK, MCR), pp. 473–486.
ECSA-2014-HorcasPF #policy #runtime #security- Runtime Enforcement of Dynamic Security Policies (JMH, MP, LF), pp. 340–356.
CASE-2014-GaoLWA #monitoring #petri net #problem #sequence #using- A monitor solution to enforce legal transition firing sequences problems by using Petri nets (XG, ZL, AW, AMAA), pp. 419–424.
DATE-2014-UbolliGBC #linear #megamodelling- Sensitivity-based weighting for passivity enforcement of linear macromodels in power integrity applications (AU, SGT, MB, AC), pp. 1–6.
PLDI-2014-LuJS #parallel #scripting language- Dynamic enforcement of determinism in a parallel scripting language (LL, WJ, MLS), p. 53.
ICEIS-v2-2014-WeiRT #data access #policy- Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
KEOD-2014-KruppS0 #mobile #ontology #policy #privacy #security- An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
KR-2014-Dyrkolbotn #how #set #using- How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
SAC-2014-GaubatzHZS #collaboration #constraints #documentation #editing #realtime #web- Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documents (PG, WH, UZ, MS), pp. 735–742.
SAC-2014-LiuTZ #constraints #mining- Mining key and referential constraints enforcement patterns (KL, HBKT, HZ), pp. 850–854.
SAC-2014-PinisettyFJM #runtime- Runtime enforcement of regular timed properties (SP, YF, TJ, HM), pp. 1279–1286.
FSE-2014-AutiliRSP #internet #named- CHOReOSynt: enforcing choreography realizability in the future internet (MA, DDR, ADS, AP), pp. 723–726.
FSE-2014-Bell #dependence #detection #testing- Detecting, isolating, and enforcing dependencies among and within test cases (JB), pp. 799–802.
FSE-2014-JoinerRJDG #performance #policy #weaving- Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
ASPLOS-2014-0001KOTRKSHC #named #policy #security- Sapper: a language for hardware-level security policy enforcement (XL, VK, JKO, MT, VRR, RK, TS, BH, FTC), pp. 97–112.
ESOP-2013-BouajjaniDM #robust- Checking and Enforcing Robustness against TSO (AB, ED, RM), pp. 533–553.
FASE-2013-AutiliRSIT #modelling #process #synthesis- A Model-Based Synthesis Process for Choreography Realizability Enforcement (MA, DDR, ADS, PI, MT), pp. 37–52.
FASE-2013-BradfieldS #calculus #game studies #qvt #μ-calculus- Enforcing QVT-R with μ-Calculus and Games (JCB, PS), pp. 282–296.
TACAS-2013-BackesGHMS #android #named #requirements- AppGuard — Enforcing User Requirements on Android Apps (MB, SG, CH, MM, PvSR), pp. 543–548.
CAiSE-2013-AguileraGO #concept #development #ide #quality- Enforcement of Conceptual Schema Quality Issues in Current Integrated Development Environments (DA, CG, AO), pp. 626–640.
SEKE-2013-PereiraAS #data access #policy #relational #runtime- Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
PPDP-2013-StewartBN #data flow #data type #dependent type #policy #semistructured data- Dependent types for enforcement of information flow and erasure policies in heterogeneous data structures (GS, AB, AN), pp. 145–156.
SAC-2013-JeonKKC #android #security- Enhancing security enforcement on unmodified Android (CJ, WK, BK, YC), pp. 1655–1656.
ISSTA-2013-LuoR #named #parallel #runtime #source code #thread- EnforceMOP: a runtime property enforcement system for multithreaded programs (QL, GR), pp. 156–166.
QoSA-2012-DajsurenBSH #architecture #case study #consistency #multi- Automotive ADLS: a study on enforcing consistency through multiple architectural levels (YD, MvdB, AS, RH), pp. 71–80.
CASE-2012-HouLZ #on the #petri net- On iterative liveness-enforcement for a class of generalized Petri nets (YH, DL, MZ), pp. 188–193.
LATA-2012-Genova #normalisation #set- Forbidding Sets and Normal Forms for Language Forbidding-Enforcing Systems (DG), pp. 289–300.
SEKE-2012-RebeloLMOR #aspect-oriented #contract #source code- Enforcing Contracts for Aspect-oriented programs with Annotations, Pointcuts and Advice (HR, RMFL, AM, CALO, MR), pp. 148–153.
POPL-2012-YangYS #automation #policy #privacy- A language for automatically enforcing privacy policies (JY, KY, ASL), pp. 85–96.
CAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime #using- Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
ICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing #using- Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
ISSTA-2012-CoughlinCDS #source code #what- Measuring enforcement windows with symbolic trace interpretation: what well-behaved programs say (DC, BYEC, AD, JGS), pp. 276–286.
DAC-2011-PatilBC #architecture #contract #synthesis- Enforcing architectural contracts in high-level synthesis (NAP, AB, DC), pp. 824–829.
DATE-2011-GobbatoCG #megamodelling #parallel #scalability- A parallel Hamiltonian eigensolver for passivity characterization and enforcement of large interconnect macromodels (LG, AC, SGT), pp. 26–31.
VLDB-2011-AtaullahT #database #modelling #policy- Business Policy Modeling and Enforcement in Databases (AAA, FWT), pp. 921–931.
ESOP-2011-JensenKP #policy- Secure the Clones — Static Enforcement of Policies for Secure Object Copying (TPJ, FK, DP), pp. 317–337.
TACAS-2011-GarbervetskyGN #invariant #using- Enforcing Structural Invariants Using Dynamic Frames (DG, DG, AN), pp. 65–80.
MoDELS-2011-HamidGJD #design #formal method #modelling- Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches (BH, SG, CJ, ND), pp. 319–333.
MoDELS-2011-HamidGJD #design #formal method #modelling- Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches (BH, SG, CJ, ND), pp. 319–333.
OOPSLA-2011-WeeratungeZJ #using- Accentuating the positive: atomicity inference and enforcement using correct executions (DW, XZ, SJ), pp. 19–34.
ECSA-2010-KacemKD #adaptation #approach #consistency #formal method #self- A Formal Approach to Enforcing Consistency in Self-adaptive Systems (NHK, AHK, KD), pp. 279–294.
ASE-2010-HalleEBB #fault #model checking #navigation #runtime #state machine #web- Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines (SH, TE, CB, TB), pp. 235–244.
CASE-2010-HuZLW #assembly #automation #concurrent #flexibility- Deadlock-free control of ratio-enforced automated manufacturing systems with flexible routes and assembly operations (HH, MZ, ZL, NW), pp. 459–464.
CASE-2010-NazeemR #approach #design #resource management- A practical approach to the design of maximally permissive liveness-enforcing supervisors for complex resource allocation systems (AN, SR), pp. 451–458.
DATE-2010-YeSP #assessment- Extended Hamiltonian Pencil for passivity assessment and enforcement for S-parameter systems (ZY, LMS, JRP), pp. 1148–1152.
DocEng-2010-SimskeB #automation #named #policy- APEX: automated policy enforcement eXchange (SJS, HB), pp. 139–142.
ESOP-2010-SwamyCC #data flow #policy- Enforcing Stateful Authorization and Information Flow Policies in Fine (NS, JC, RC), pp. 529–549.
ICSM-2010-CeccatoT #consistency #legacy #migration #static analysis #thread- Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system (MC, PT), pp. 1–9.
PLDI-2010-ChenCS #compilation #security #verification- Type-preserving compilation of end-to-end verification of security enforcement (JC, RC, NS), pp. 412–423.
SEFM-2010-BartolettiZ- Static Enforcement of Service Deadlines (MB, RZ), pp. 320–324.
CHI-2010-TullioHWZGT #experience #video- Experience, adjustment, and engagement: the role of video in law enforcement (JT, EMH, DW, HZ, CVSG, AT), pp. 1505–1514.
SEKE-2010-Nehmer #approach #consistency #exception- A Log-Assisted Approach Enforcing Consistency in the Presence of Exceptions (NN), pp. 757–764.
GPCE-J-2007-FradetH10 #aspect-oriented- Aspects of availability: Enforcing timed properties to prevent denial of service (PF, SHTH), pp. 516–542.
ICSE-2010-GabelS #online- Online inference and enforcement of temporal properties (MG, ZS), pp. 15–24.
ICSE-2010-Lewis #generative #invariant #named #realtime- Zenet: generating and enforcing real-time temporal invariants (CL), pp. 329–330.
ICSE-2010-Mattsson #architecture #automation #design- Automatic enforcement of architectural design rules (AM), pp. 369–372.
ISMM-2010-NagarakatteZMZ #c #compilation #named #safety- CETS: compiler enforced temporal safety for C (SN, JZ, MMKM, SZ), pp. 31–40.
OSDI-2010-AviramWHF #parallel #performance- Efficient System-Enforced Deterministic Parallelism (AA, SCW, SH, BF), pp. 193–206.
SIGMOD-2009-CorcoranSH #security #web- Cross-tier, label-based security enforcement for web applications (BJC, NS, MWH), pp. 269–282.
SEKE-2009-KulkarniCZ #framework #monitoring #named #online #policy- iPass: An Integrated Framework for Educating, Monitoring and Enforcing Password Policies for Online Services (DK, DC, FZ), pp. 548–551.
SAC-2009-FalconeFM #classification #monitoring- Enforcement monitoring wrt. the safety-progress classification of properties (YF, JCF, LM), pp. 593–600.
CAV-2009-HalleV #contract #interface #web- Browser-Based Enforcement of Interface Contracts in Web Applications with BeepBeep (SH, RV), pp. 648–653.
WICSA-2008-Aldrich #architecture #using- Using Types to Enforce Architectural Structure (JA), pp. 211–220.
ASE-2008-BrichauKM #source code #using- Enforcing Structural Regularities in Source Code using IntensiVE (JB, AK, KM), pp. 471–472.
ESOP-2008-HuntS #semantics- Just Forget It — The Semantics and Enforcement of Information Erasure (SH, DS), pp. 239–253.
EDOC-2008-Fabry #database #requirements- Database Vault: Enforcing Separation of Duties to Meet Regulatory Compliance Requirements (HWF).
ICPR-2008-GrumB #3d #consistency #image #modelling #multi- Enforcing image consistency in multiple 3-D object modelling (MG, AGB), pp. 1–4.
OOPSLA-2008-GopinathanR #analysis #protocol #runtime- Enforcing object protocols by combining static and runtime analysis (MG, SKR), pp. 245–260.
OSDI-2008-ZeldovichKDK #hardware #memory management #policy #security #using- Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
CBSE-2007-Dahlgren #component #contract #interface- Performance-Driven Interface Contract Enforcement for Scientific Components (TD), pp. 157–172.
SIGMOD-2007-QiaoSFPCBK #database #framework #policy- A framework for enforcing application policies in database systems (LQ, BS, GF, AP, BC, TB, WK), pp. 981–992.
FASE-2007-TibermacineHK #architecture #component #constraints #deployment #distributed- Enforcing Architecture and Deployment Constraints of Distributed Component-Based Software (CT, DH, RK), pp. 140–154.
ICPC-2007-ShearerC #constraints #source code- Enforcing Constraints Between Documentary Comments and Source Code (CDS, MLC), pp. 271–280.
PASTE-2007-ChinMMM #programming #validation- Enforcing and validating user-defined programming disciplines (BC, DM, SM, TDM), pp. 85–86.
PLDI-2007-ShpeismanMABGHMS #order- Enforcing isolation and ordering in STM (TS, VM, ARAT, SB, DG, RLH, KFM, BS), pp. 78–88.
AGTIVE-2007-AmelunxenLSS #graph transformation #guidelines #modelling- Checking and Enforcement of Modeling Guidelines with Graph Transformations (CA, EL, AS, IS), pp. 313–328.
SAC-2007-OrlovskyR #distributed #policy #security- Decentralized enforcement of security policies for distributed computational systems (AO, DR), pp. 241–248.
PLDI-2006-DhurjatiKA #alias #analysis #named- SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
FM-2006-ArthoBH #injection #named #performance- Enforcer — Efficient Failure Injection (CA, AB, SH), pp. 412–427.
ICEIS-SAIC-2006-SattanathanNMM #policy #web #web service- Context-Driven Policy Enforcement and Reconciliation for Web Services (SS, NCN, ZM, GKM), pp. 93–99.
SAC-2006-LucraftEA #internet- Enforcing path uniqueness in internet routing (DL, AE, FA), pp. 399–403.
SAC-2006-WelchL #policy #security- Policy-driven reflective enforcement of security policies (IW, FL), pp. 1580–1584.
SAC-2006-YoussefAA #mobile #privacy #semantics- Semantically enhanced enforcement of mobile consumer’s privacy preferences (MY, NRA, VA), pp. 1172–1176.
OSDI-2006-CastroCH #data flow- Securing Software by Enforcing Data-flow Integrity (MC, MC, TLH), pp. 147–160.
ISSTA-2006-DemskyEGMPR #consistency #data type #specification- Inference and enforcement of data structure consistency specifications (BD, MDE, PJG, SM, JHP, MCR), pp. 233–244.
ESOP-2005-ChanderEILN #bound #dynamic analysis #verification- Enforcing Resource Bounds via Static Verification of Dynamic Checks (AC, DE, NI, PL, GCN), pp. 311–325.
MoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using- A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
MoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using- A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
SAC-2005-YangEY #database #security #semistructured data #specification- Mediation security specification and enforcement for heterogeneous databases (LY, RKE, HY), pp. 354–358.
ICSE-2005-SherrellS #education #process #question- Will earlier projects plus a disciplined process enforce SE principles throughout the CS curriculum? (LBS, SGS), pp. 619–620.
HPDC-2005-KarmonLS #distributed #named #performance #protocol- GWiQ-P: an efficient decentralized grid-wide quota enforcement protocol (KK, LL, AS), pp. 222–232.
SOSP-2005-SeshadriLSPDK #execution #legacy #named #verification- Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems (AS, ML, ES, AP, LvD, PKK), pp. 1–16.
ICSM-2004-JanssensMHV #approach #composition #configuration management- A Modular Approach Enforcing Safe Reconfiguration of Producer-Consumer Applications (NJ, SM, TH, PV), pp. 274–283.
SIGAda-2004-ChapmanH #analysis #data flow #modelling #safety #security- Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
ICEIS-v4-2004-CostaOS #identification- E-Services in Mission-Critical Organizations: Identification Enforcement (CC, JLO, AS), pp. 389–396.
GPCE-2004-CepaM #dependence #dot-net- Declaring and Enforcing Dependencies Between .NET Custom Attributes (VC, MM), pp. 283–297.
SAC-2004-StefanoSPT #communication #framework- Enforcing agent communication laws by means of a reflective framework (ADS, CS, GP, ET), pp. 462–468.
ESOP-2003-AltisenCMR #using- Using Controller-Synthesis Techniques to Build Property-Enforcing Layers (KA, AC, FM, ÉR), pp. 174–188.
FoSSaCS-2003-BlanchetP #encryption #protocol #termination #verification- Verification of Cryptographic Protocols: Tagging Enforces Termination (BB, AP), pp. 136–152.
ECOOP-2003-LamR #analysis #automation #design #type system- A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information (PL, MCR), pp. 275–302.
ESEC-FSE-2003-LeeA #component- Policy-enforced linking of untrusted components (EL, AWA), pp. 371–374.
CBSE-2003-VecellioT #framework #policy #predict- Infrastructure Support for Predictable Policy Enforcement (GV, WT), p. 13.
EDOC-2002-MilosevicJDP #contract- Discretionary Enforcement of Electronic Contracts (ZM, AJ, TD, MAP), pp. 39–50.
ASE-2001-AndradeFW #automation #configuration management #policy- Enforcing Business Policies Through Automated Reconfiguration (LFA, JLF, MW), p. 426–?.
ESOP-2001-Thiemann #safety #using- Enforcing Safety Properties Using Type Specialization (PT), pp. 62–76.
PLDI-2001-DeLineF #bytecode #low level #protocol- Enforcing High-Level Protocols in Low-Level Software (RD, MF), pp. 59–69.
ASE-2000-Schewe #automation #consistency- Controlled Automation of Consistency Enforcement (KDS), pp. 265–268.
SAS-2000-Jackson #constraints #design #logic- Enforcing Design Constraints with Object Logic (DJ), pp. 1–21.
ICFP-2000-SkalkaS #security- Static enforcement of security with types (CS, SFS), pp. 34–45.
POPL-2000-ColcombetF #program transformation- Enforcing Trace Properties by Program Transformation (TC, PF), pp. 54–66.
HT-1998-FurtadoM #flexibility #hypermedia #type system- Enforcing Strong Object Typing in Flexible Hypermedia (PF, HM), pp. 171–179.
EDOC-1998-SyrbeP #analysis- An enterprise-level analysis of customer-provider relationships and implications for QoS enforcement (JHS, TP), pp. 208–217.
SIGMOD-1997-JajodiaSSB #data access #framework #multi #policy- A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
STOC-1996-DworkLN #self- Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version) (CD, JBL, MN), pp. 489–498.
ICLP-1995-CodognetR #constraints #programming- NMCC Programming: Constraint Enforcement and Retracting in CC Programming (PC, FR), pp. 417–431.
VLDB-1993-AttieSSR #dependence #specification- Specifying and Enforcing Intertask Dependencies (PCA, MPS, APS, MR), pp. 134–145.
ISSTA-1993-Goradia #effectiveness #impact analysis- Dynamic Impact Analysis: A Cost-Effective Technique to Enforce Error-Propagation (TG), pp. 171–181.
ML-1990-Hammond #learning #process- Learning and Enforcement: Stabilizing Environments to Facilitate Activity (KJH), pp. 204–210.
VLDB-1988-CasanovaTF #dependence- Enforcing Inclusion Dependencies and Referencial Integrity (MAC, LT, ALF), pp. 38–49.
CSL-1988-SudkampK #constraints #semantics- Enforcement of Integrity Constraints in a Semantic Data Model (NS, PK), pp. 313–328.
SIGMOD-1984-ShepherdK #database #knowledge base #named #semantics #specification- PRISM: A Knowledge Based System for Semantic Integrity Specification and Enforcement in Database Systems (AS, LK), pp. 307–315.
VLDB-1984-EhrichLG #constraints #database #semantics #specification- Specification, Semantics, and Enforcement of Dynamic Database Constraints (HDE, UWL, MG), pp. 301–308.
VLDB-1984-Morgenstern #automation #constraints #declarative #equation- Constraint Equations: Declarative Expression of Constraints With Automatic Enforcement (MM), pp. 291–300.
POPL-1983-Strom #security- Mechanisms for Compile-Time Enforcement of Security (RES), pp. 276–284.
ICALP-1982-EhrenfeuchtHR #context-free grammar- Conditions Enforcing Regularity of Context-Free Languages (AE, DH, GR), pp. 187–191.
SOSP-1975-JonesL #policy #security- The Enforcement of Security Policies for Computation (AKJ, RJL), pp. 197–206.