138 papers:
- DAC-2015-McLaughlin #behaviour #policy
- Blocking unsafe behaviors in control systems through static and dynamic policy enforcement (SM), p. 6.
- SIGMOD-2015-UpadhyayaBS #automation #policy
- Automatic Enforcement of Data Use Policies with DataLawyer (PU, MB, DS), pp. 213–225.
- TACAS-2015-BloemKKW #runtime #synthesis
- Shield Synthesis: — Runtime Enforcement for Reactive Systems (RB, BK, RK, CW), pp. 533–548.
- PLDI-2015-JohnsonWMC #dependence #graph #security
- Exploring and enforcing security guarantees via program dependence graphs (AJ, LW, SM, SC), pp. 291–302.
- CHI-2015-RooksbyRMC #process
- Pass the Ball: Enforced Turn-Taking in Activity Tracking (JR, MR, AM, MC), pp. 2417–2426.
- ICEIS-v3-2015-Piedrabuena0R #data transformation
- Enforcing Data Protection Regulations within e-Government Master Data Management Systems (FP, LG, RR), pp. 316–321.
- POPL-2015-NgoMMP #black box #policy #runtime #security #source code
- Runtime Enforcement of Security Policies on Black Box Reactive Programs (MN, FM, DM, FP), pp. 43–54.
- REFSQ-2015-LiHM #requirements #security #specification
- Analyzing and Enforcing Security Mechanisms on Requirements Specifications (TL, JH, JM), pp. 115–131.
- SAC-2015-CharafeddineEFJ #component #runtime
- Runtime enforcement for component-based systems (HC, KEH, YF, MJ), pp. 1789–1796.
- SAC-2015-LabibPCG #approach #development #learning #product line #reuse
- Enforcing reuse and customization in the development of learning objects: a product line approach (AEL, MCP, JHC, AG), pp. 261–263.
- ESEC-FSE-2015-PrauseJ #gamification
- Gamification for enforcing coding conventions (CRP, MJ), pp. 649–660.
- ICSE-v2-2015-IzquierdoC #open source
- Enabling the Definition and Enforcement of Governance Rules in Open Source Systems (JLCI, JC), pp. 505–514.
- ASPLOS-2015-Sidiroglou-Douskos #automation #branch #integer #using
- Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement (SSD, EL, NR, PP, FL, DK, MCR), pp. 473–486.
- ECSA-2014-HorcasPF #policy #runtime #security
- Runtime Enforcement of Dynamic Security Policies (JMH, MP, LF), pp. 340–356.
- CASE-2014-GaoLWA #monitoring #petri net #problem #sequence #using
- A monitor solution to enforce legal transition firing sequences problems by using Petri nets (XG, ZL, AW, AMAA), pp. 419–424.
- DATE-2014-UbolliGBC #linear #megamodelling
- Sensitivity-based weighting for passivity enforcement of linear macromodels in power integrity applications (AU, SGT, MB, AC), pp. 1–6.
- PLDI-2014-LuJS #parallel #scripting language
- Dynamic enforcement of determinism in a parallel scripting language (LL, WJ, MLS), p. 53.
- ICEIS-v2-2014-WeiRT #data access #policy
- Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
- KEOD-2014-KruppS0 #mobile #ontology #policy #privacy #security
- An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
- KR-2014-Dyrkolbotn #how #set #using
- How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
- SAC-2014-GaubatzHZS #collaboration #constraints #documentation #editing #realtime #web
- Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documents (PG, WH, UZ, MS), pp. 735–742.
- SAC-2014-LiuTZ #constraints #mining
- Mining key and referential constraints enforcement patterns (KL, HBKT, HZ), pp. 850–854.
- SAC-2014-PinisettyFJM #runtime
- Runtime enforcement of regular timed properties (SP, YF, TJ, HM), pp. 1279–1286.
- FSE-2014-AutiliRSP #internet #named
- CHOReOSynt: enforcing choreography realizability in the future internet (MA, DDR, ADS, AP), pp. 723–726.
- FSE-2014-Bell #dependence #detection #testing
- Detecting, isolating, and enforcing dependencies among and within test cases (JB), pp. 799–802.
- FSE-2014-JoinerRJDG #performance #policy #weaving
- Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
- ASPLOS-2014-0001KOTRKSHC #named #policy #security
- Sapper: a language for hardware-level security policy enforcement (XL, VK, JKO, MT, VRR, RK, TS, BH, FTC), pp. 97–112.
- ESOP-2013-BouajjaniDM #robust
- Checking and Enforcing Robustness against TSO (AB, ED, RM), pp. 533–553.
- FASE-2013-AutiliRSIT #modelling #process #synthesis
- A Model-Based Synthesis Process for Choreography Realizability Enforcement (MA, DDR, ADS, PI, MT), pp. 37–52.
- FASE-2013-BradfieldS #calculus #game studies #qvt #μ-calculus
- Enforcing QVT-R with μ-Calculus and Games (JCB, PS), pp. 282–296.
- TACAS-2013-BackesGHMS #android #named #requirements
- AppGuard — Enforcing User Requirements on Android Apps (MB, SG, CH, MM, PvSR), pp. 543–548.
- CAiSE-2013-AguileraGO #concept #development #ide #quality
- Enforcement of Conceptual Schema Quality Issues in Current Integrated Development Environments (DA, CG, AO), pp. 626–640.
- SEKE-2013-PereiraAS #data access #policy #relational #runtime
- Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
- PPDP-2013-StewartBN #data flow #data type #dependent type #policy #semistructured data
- Dependent types for enforcement of information flow and erasure policies in heterogeneous data structures (GS, AB, AN), pp. 145–156.
- SAC-2013-JeonKKC #android #security
- Enhancing security enforcement on unmodified Android (CJ, WK, BK, YC), pp. 1655–1656.
- ISSTA-2013-LuoR #named #parallel #runtime #source code #thread
- EnforceMOP: a runtime property enforcement system for multithreaded programs (QL, GR), pp. 156–166.
- QoSA-2012-DajsurenBSH #architecture #case study #consistency #multi
- Automotive ADLS: a study on enforcing consistency through multiple architectural levels (YD, MvdB, AS, RH), pp. 71–80.
- CASE-2012-HouLZ #on the #petri net
- On iterative liveness-enforcement for a class of generalized Petri nets (YH, DL, MZ), pp. 188–193.
- LATA-2012-Genova #normalisation #set
- Forbidding Sets and Normal Forms for Language Forbidding-Enforcing Systems (DG), pp. 289–300.
- SEKE-2012-RebeloLMOR #aspect-oriented #contract #source code
- Enforcing Contracts for Aspect-oriented programs with Annotations, Pointcuts and Advice (HR, RMFL, AM, CALO, MR), pp. 148–153.
- POPL-2012-YangYS #automation #policy #privacy
- A language for automatically enforcing privacy policies (JY, KY, ASL), pp. 85–96.
- CAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime #using
- Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
- ICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing #using
- Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
- ISSTA-2012-CoughlinCDS #source code #what
- Measuring enforcement windows with symbolic trace interpretation: what well-behaved programs say (DC, BYEC, AD, JGS), pp. 276–286.
- DAC-2011-PatilBC #architecture #contract #synthesis
- Enforcing architectural contracts in high-level synthesis (NAP, AB, DC), pp. 824–829.
- DATE-2011-GobbatoCG #megamodelling #parallel #scalability
- A parallel Hamiltonian eigensolver for passivity characterization and enforcement of large interconnect macromodels (LG, AC, SGT), pp. 26–31.
- VLDB-2011-AtaullahT #database #modelling #policy
- Business Policy Modeling and Enforcement in Databases (AAA, FWT), pp. 921–931.
- ESOP-2011-JensenKP #policy
- Secure the Clones — Static Enforcement of Policies for Secure Object Copying (TPJ, FK, DP), pp. 317–337.
- TACAS-2011-GarbervetskyGN #invariant #using
- Enforcing Structural Invariants Using Dynamic Frames (DG, DG, AN), pp. 65–80.
- MoDELS-2011-HamidGJD #design #formal method #modelling
- Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches (BH, SG, CJ, ND), pp. 319–333.
- MoDELS-2011-HamidGJD #design #formal method #modelling
- Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches (BH, SG, CJ, ND), pp. 319–333.
- OOPSLA-2011-WeeratungeZJ #using
- Accentuating the positive: atomicity inference and enforcement using correct executions (DW, XZ, SJ), pp. 19–34.
- ECSA-2010-KacemKD #adaptation #approach #consistency #formal method #self
- A Formal Approach to Enforcing Consistency in Self-adaptive Systems (NHK, AHK, KD), pp. 279–294.
- ASE-2010-HalleEBB #fault #model checking #navigation #runtime #state machine #web
- Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines (SH, TE, CB, TB), pp. 235–244.
- CASE-2010-HuZLW #assembly #automation #concurrent #flexibility
- Deadlock-free control of ratio-enforced automated manufacturing systems with flexible routes and assembly operations (HH, MZ, ZL, NW), pp. 459–464.
- CASE-2010-NazeemR #approach #design #resource management
- A practical approach to the design of maximally permissive liveness-enforcing supervisors for complex resource allocation systems (AN, SR), pp. 451–458.
- DATE-2010-YeSP #assessment
- Extended Hamiltonian Pencil for passivity assessment and enforcement for S-parameter systems (ZY, LMS, JRP), pp. 1148–1152.
- DocEng-2010-SimskeB #automation #named #policy
- APEX: automated policy enforcement eXchange (SJS, HB), pp. 139–142.
- ESOP-2010-SwamyCC #data flow #policy
- Enforcing Stateful Authorization and Information Flow Policies in Fine (NS, JC, RC), pp. 529–549.
- ICSM-2010-CeccatoT #consistency #legacy #migration #static analysis #thread
- Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system (MC, PT), pp. 1–9.
- PLDI-2010-ChenCS #compilation #security #verification
- Type-preserving compilation of end-to-end verification of security enforcement (JC, RC, NS), pp. 412–423.
- SEFM-2010-BartolettiZ
- Static Enforcement of Service Deadlines (MB, RZ), pp. 320–324.
- CHI-2010-TullioHWZGT #experience #video
- Experience, adjustment, and engagement: the role of video in law enforcement (JT, EMH, DW, HZ, CVSG, AT), pp. 1505–1514.
- SEKE-2010-Nehmer #approach #consistency #exception
- A Log-Assisted Approach Enforcing Consistency in the Presence of Exceptions (NN), pp. 757–764.
- GPCE-J-2007-FradetH10 #aspect-oriented
- Aspects of availability: Enforcing timed properties to prevent denial of service (PF, SHTH), pp. 516–542.
- ICSE-2010-GabelS #online
- Online inference and enforcement of temporal properties (MG, ZS), pp. 15–24.
- ICSE-2010-Lewis #generative #invariant #named #realtime
- Zenet: generating and enforcing real-time temporal invariants (CL), pp. 329–330.
- ICSE-2010-Mattsson #architecture #automation #design
- Automatic enforcement of architectural design rules (AM), pp. 369–372.
- ISMM-2010-NagarakatteZMZ #c #compilation #named #safety
- CETS: compiler enforced temporal safety for C (SN, JZ, MMKM, SZ), pp. 31–40.
- OSDI-2010-AviramWHF #parallel #performance
- Efficient System-Enforced Deterministic Parallelism (AA, SCW, SH, BF), pp. 193–206.
- SIGMOD-2009-CorcoranSH #security #web
- Cross-tier, label-based security enforcement for web applications (BJC, NS, MWH), pp. 269–282.
- SEKE-2009-KulkarniCZ #framework #monitoring #named #online #policy
- iPass: An Integrated Framework for Educating, Monitoring and Enforcing Password Policies for Online Services (DK, DC, FZ), pp. 548–551.
- SAC-2009-FalconeFM #classification #monitoring
- Enforcement monitoring wrt. the safety-progress classification of properties (YF, JCF, LM), pp. 593–600.
- CAV-2009-HalleV #contract #interface #web
- Browser-Based Enforcement of Interface Contracts in Web Applications with BeepBeep (SH, RV), pp. 648–653.
- WICSA-2008-Aldrich #architecture #using
- Using Types to Enforce Architectural Structure (JA), pp. 211–220.
- ASE-2008-BrichauKM #source code #using
- Enforcing Structural Regularities in Source Code using IntensiVE (JB, AK, KM), pp. 471–472.
- ESOP-2008-HuntS #semantics
- Just Forget It — The Semantics and Enforcement of Information Erasure (SH, DS), pp. 239–253.
- EDOC-2008-Fabry #database #requirements
- Database Vault: Enforcing Separation of Duties to Meet Regulatory Compliance Requirements (HWF).
- ICPR-2008-GrumB #3d #consistency #image #modelling #multi
- Enforcing image consistency in multiple 3-D object modelling (MG, AGB), pp. 1–4.
- OOPSLA-2008-GopinathanR #analysis #protocol #runtime
- Enforcing object protocols by combining static and runtime analysis (MG, SKR), pp. 245–260.
- OSDI-2008-ZeldovichKDK #hardware #memory management #policy #security #using
- Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
- CBSE-2007-Dahlgren #component #contract #interface
- Performance-Driven Interface Contract Enforcement for Scientific Components (TD), pp. 157–172.
- SIGMOD-2007-QiaoSFPCBK #database #framework #policy
- A framework for enforcing application policies in database systems (LQ, BS, GF, AP, BC, TB, WK), pp. 981–992.
- FASE-2007-TibermacineHK #architecture #component #constraints #deployment #distributed
- Enforcing Architecture and Deployment Constraints of Distributed Component-Based Software (CT, DH, RK), pp. 140–154.
- ICPC-2007-ShearerC #constraints #source code
- Enforcing Constraints Between Documentary Comments and Source Code (CDS, MLC), pp. 271–280.
- PASTE-2007-ChinMMM #programming #validation
- Enforcing and validating user-defined programming disciplines (BC, DM, SM, TDM), pp. 85–86.
- PLDI-2007-ShpeismanMABGHMS #order
- Enforcing isolation and ordering in STM (TS, VM, ARAT, SB, DG, RLH, KFM, BS), pp. 78–88.
- AGTIVE-2007-AmelunxenLSS #graph transformation #guidelines #modelling
- Checking and Enforcement of Modeling Guidelines with Graph Transformations (CA, EL, AS, IS), pp. 313–328.
- SAC-2007-OrlovskyR #distributed #policy #security
- Decentralized enforcement of security policies for distributed computational systems (AO, DR), pp. 241–248.
- PLDI-2006-DhurjatiKA #alias #analysis #named
- SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
- FM-2006-ArthoBH #injection #named #performance
- Enforcer — Efficient Failure Injection (CA, AB, SH), pp. 412–427.
- ICEIS-SAIC-2006-SattanathanNMM #policy #web #web service
- Context-Driven Policy Enforcement and Reconciliation for Web Services (SS, NCN, ZM, GKM), pp. 93–99.
- SAC-2006-LucraftEA #internet
- Enforcing path uniqueness in internet routing (DL, AE, FA), pp. 399–403.
- SAC-2006-WelchL #policy #security
- Policy-driven reflective enforcement of security policies (IW, FL), pp. 1580–1584.
- SAC-2006-YoussefAA #mobile #privacy #semantics
- Semantically enhanced enforcement of mobile consumer’s privacy preferences (MY, NRA, VA), pp. 1172–1176.
- OSDI-2006-CastroCH #data flow
- Securing Software by Enforcing Data-flow Integrity (MC, MC, TLH), pp. 147–160.
- ISSTA-2006-DemskyEGMPR #consistency #data type #specification
- Inference and enforcement of data structure consistency specifications (BD, MDE, PJG, SM, JHP, MCR), pp. 233–244.
- ESOP-2005-ChanderEILN #bound #dynamic analysis #verification
- Enforcing Resource Bounds via Static Verification of Dynamic Checks (AC, DE, NI, PL, GCN), pp. 311–325.
- MoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using
- A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
- MoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using
- A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
- SAC-2005-YangEY #database #security #semistructured data #specification
- Mediation security specification and enforcement for heterogeneous databases (LY, RKE, HY), pp. 354–358.
- ICSE-2005-SherrellS #education #process #question
- Will earlier projects plus a disciplined process enforce SE principles throughout the CS curriculum? (LBS, SGS), pp. 619–620.
- HPDC-2005-KarmonLS #distributed #named #performance #protocol
- GWiQ-P: an efficient decentralized grid-wide quota enforcement protocol (KK, LL, AS), pp. 222–232.
- SOSP-2005-SeshadriLSPDK #execution #legacy #named #verification
- Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems (AS, ML, ES, AP, LvD, PKK), pp. 1–16.
- ICSM-2004-JanssensMHV #approach #composition #configuration management
- A Modular Approach Enforcing Safe Reconfiguration of Producer-Consumer Applications (NJ, SM, TH, PV), pp. 274–283.
- SIGAda-2004-ChapmanH #analysis #data flow #modelling #safety #security
- Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
- ICEIS-v4-2004-CostaOS #identification
- E-Services in Mission-Critical Organizations: Identification Enforcement (CC, JLO, AS), pp. 389–396.
- GPCE-2004-CepaM #dependence #dot-net
- Declaring and Enforcing Dependencies Between .NET Custom Attributes (VC, MM), pp. 283–297.
- SAC-2004-StefanoSPT #communication #framework
- Enforcing agent communication laws by means of a reflective framework (ADS, CS, GP, ET), pp. 462–468.
- ESOP-2003-AltisenCMR #using
- Using Controller-Synthesis Techniques to Build Property-Enforcing Layers (KA, AC, FM, ÉR), pp. 174–188.
- FoSSaCS-2003-BlanchetP #encryption #protocol #termination #verification
- Verification of Cryptographic Protocols: Tagging Enforces Termination (BB, AP), pp. 136–152.
- ECOOP-2003-LamR #analysis #automation #design #type system
- A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information (PL, MCR), pp. 275–302.
- ESEC-FSE-2003-LeeA #component
- Policy-enforced linking of untrusted components (EL, AWA), pp. 371–374.
- CBSE-2003-VecellioT #framework #policy #predict
- Infrastructure Support for Predictable Policy Enforcement (GV, WT), p. 13.
- EDOC-2002-MilosevicJDP #contract
- Discretionary Enforcement of Electronic Contracts (ZM, AJ, TD, MAP), pp. 39–50.
- ASE-2001-AndradeFW #automation #configuration management #policy
- Enforcing Business Policies Through Automated Reconfiguration (LFA, JLF, MW), p. 426–?.
- ESOP-2001-Thiemann #safety #using
- Enforcing Safety Properties Using Type Specialization (PT), pp. 62–76.
- PLDI-2001-DeLineF #bytecode #low level #protocol
- Enforcing High-Level Protocols in Low-Level Software (RD, MF), pp. 59–69.
- ASE-2000-Schewe #automation #consistency
- Controlled Automation of Consistency Enforcement (KDS), pp. 265–268.
- SAS-2000-Jackson #constraints #design #logic
- Enforcing Design Constraints with Object Logic (DJ), pp. 1–21.
- ICFP-2000-SkalkaS #security
- Static enforcement of security with types (CS, SFS), pp. 34–45.
- POPL-2000-ColcombetF #program transformation
- Enforcing Trace Properties by Program Transformation (TC, PF), pp. 54–66.
- HT-1998-FurtadoM #flexibility #hypermedia #type system
- Enforcing Strong Object Typing in Flexible Hypermedia (PF, HM), pp. 171–179.
- EDOC-1998-SyrbeP #analysis
- An enterprise-level analysis of customer-provider relationships and implications for QoS enforcement (JHS, TP), pp. 208–217.
- SIGMOD-1997-JajodiaSSB #data access #framework #multi #policy
- A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
- STOC-1996-DworkLN #self
- Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version) (CD, JBL, MN), pp. 489–498.
- ICLP-1995-CodognetR #constraints #programming
- NMCC Programming: Constraint Enforcement and Retracting in CC Programming (PC, FR), pp. 417–431.
- VLDB-1993-AttieSSR #dependence #specification
- Specifying and Enforcing Intertask Dependencies (PCA, MPS, APS, MR), pp. 134–145.
- ISSTA-1993-Goradia #effectiveness #impact analysis
- Dynamic Impact Analysis: A Cost-Effective Technique to Enforce Error-Propagation (TG), pp. 171–181.
- ML-1990-Hammond #learning #process
- Learning and Enforcement: Stabilizing Environments to Facilitate Activity (KJH), pp. 204–210.
- VLDB-1988-CasanovaTF #dependence
- Enforcing Inclusion Dependencies and Referencial Integrity (MAC, LT, ALF), pp. 38–49.
- CSL-1988-SudkampK #constraints #semantics
- Enforcement of Integrity Constraints in a Semantic Data Model (NS, PK), pp. 313–328.
- SIGMOD-1984-ShepherdK #database #knowledge base #named #semantics #specification
- PRISM: A Knowledge Based System for Semantic Integrity Specification and Enforcement in Database Systems (AS, LK), pp. 307–315.
- VLDB-1984-EhrichLG #constraints #database #semantics #specification
- Specification, Semantics, and Enforcement of Dynamic Database Constraints (HDE, UWL, MG), pp. 301–308.
- VLDB-1984-Morgenstern #automation #constraints #declarative #equation
- Constraint Equations: Declarative Expression of Constraints With Automatic Enforcement (MM), pp. 291–300.
- POPL-1983-Strom #security
- Mechanisms for Compile-Time Enforcement of Security (RES), pp. 276–284.
- ICALP-1982-EhrenfeuchtHR #context-free grammar
- Conditions Enforcing Regularity of Context-Free Languages (AE, DH, GR), pp. 187–191.
- SOSP-1975-JonesL #policy #security
- The Enforcement of Security Policies for Computation (AKJ, RJL), pp. 197–206.