Sciweavers

623 search results - page 17 / 125
» A proposal for Ontology Security Standards
Sort
View
ECML
2007
Springer
14 years 1 months ago
Conceptual Clustering Applied to Ontologies
Abstract. A clustering method is presented which can be applied to semantically annotated resources in the context of ontological knowledge bases. This method can be used to discov...
Floriana Esposito, Nicola Fanizzi, Claudia d'Amato
IADIS
2008
13 years 9 months ago
Automatic Generation Of Multiple Choice Questions From Domain Ontologies
The aim of this paper is to present an innovative approach for generating multiple choice questions in automatic way. Although other approaches have been already reported in the l...
Andreas Papasalouros, Konstantinos Kanaris, Konsta...
ESORICS
2009
Springer
14 years 8 months ago
ID-Based Secure Distance Bounding and Localization
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure d...
Nils Ole Tippenhauer, Srdjan Capkun
SEMWEB
2009
Springer
14 years 2 months ago
A Syntax for Rules in OWL 2
Being able to extend an OWL ontology with some form of rules is a feature that many ontology developers consider as very important. Nevertheless, working with rules in practice can...
Birte Glimm, Matthew Horridge, Bijan Parsia, Peter...
SIGOPSE
2004
ACM
14 years 1 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn