Data Privacy Management and Autonomous Spontaneous Security
暂无分享,去创建一个
[1] Frederick Reiss,et al. SystemT: a system for declarative information extraction , 2009, SGMD.
[2] Geoffrey Smith,et al. Secure Information Flow for Distributed Systems , 2009, Formal Aspects in Security and Trust.
[3] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[4] Jeffrey S. Fenton. Information Protection Systems , 1973 .
[5] Hamish Cunningham,et al. GATE-a General Architecture for Text Engineering , 1996, COLING.
[6] Florian Kammueller,et al. A security model for functional active objects with an implementation in Erlang , 2011 .
[7] Kees van Deemter,et al. On Coreferring: Coreference in MUC and Related Annotation Schemes , 2000, CL.
[8] Dieter Hutter,et al. Security of multi-agent systems: A case study on comparison shopping , 2007, J. Appl. Log..
[9] Adeline Nazarenko,et al. Ontologies and Information Extraction , 2006, ArXiv.
[10] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[11] O. Edfors,et al. OFDM channel estimation by singular value decomposition , 1996, Proceedings of Vehicular Technology Conference - VTC.
[12] Ludovic Henrio,et al. ASPfun : A typed functional active object calculus , 2012, Sci. Comput. Program..
[13] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[14] Kalina Bontcheva,et al. Text Processing with GATE , 2011 .
[15] Robert H. Halstead,et al. MULTILISP: a language for concurrent symbolic computation , 1985, TOPL.
[16] Florian Kammüller. Privacy Enforcement and Analysis for Functional Active Objects , 2010, DPM/SETOP.
[17] Lynette Hirschman,et al. Automating Coreference: The Role of Annotated Training Data , 1998, ArXiv.
[18] Carolyn L. Talcott,et al. Towards a Theory of Actor Computation , 1992, CONCUR.
[19] Alicia Ageno,et al. Adaptive information extraction , 2006, CSUR.
[20] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[21] Anindya Banerjee,et al. Stack-based access control and secure information flow , 2005, J. Funct. Program..
[22] Hamish Cunningham,et al. Information Extraction, Automatic , 2006 .
[23] Jerry R. Hobbs. The Generic Information Extraction System , 1993, MUC.
[24] Martín Abadi,et al. A Theory of Objects , 1996, Monographs in Computer Science.
[25] Sharad Mehrotra,et al. XAR: An Integrated Framework for Information Extraction , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.
[26] Diana Maynard,et al. JAPE: a Java Annotation Patterns Engine , 2000 .
[27] Denis Caromel,et al. Secured Information Flow for Asynchronous Sequential Processes , 2007, SecCO@CONCUR.
[28] Heiko Mantel,et al. A Unifying Approach to the Security of Distributed and Multi-Threaded Programs , 2003, J. Comput. Secur..
[29] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[30] Denis Caromel,et al. Asynchronous and deterministic objects , 2004, POPL.
[31] Denis Caromel,et al. ProActive: an integrated platform for programming and running applications on Grids and P2P systems , 2006 .
[32] Sushil Jajodia,et al. An audit model for object-oriented databases , 1991, Proceedings Seventh Annual Computer Security Applications Conference.
[33] B. Davey,et al. Introduction to Lattices and Order: Appendix B: further reading , 2002 .
[34] Florian Kammueller,et al. Using functional active objects to enforce privacy , 2010 .