Sciweavers

623 search results - page 26 / 125
» A proposal for Ontology Security Standards
Sort
View
ESOP
2003
Springer
14 years 28 days ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
CRYPTO
2010
Springer
195views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone access structures combined with inner-product rel...
Tatsuaki Okamoto, Katsuyuki Takashima
ESAS
2007
Springer
14 years 1 months ago
Security Associations in Personal Networks: A Comparative Analysis
Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different pro...
Jani Suomalainen, Jukka Valkonen, N. Asokan
LREC
2008
110views Education» more  LREC 2008»
13 years 9 months ago
Evaluating Evaluation Metrics for Ontology-Based Applications: Infinite Reflection
In this paper, we discuss methods of measuring the performance of ontology-based information extraction systems. We focus particularly on the Balanced Distance Metric (BDM), a new...
Diana Maynard, Wim Peters, Yaoyong Li
DLOG
2011
12 years 11 months ago
Extracting Finite Sets of Entailments from OWL Ontologies
The canonical standard description logic reasoning service is classification, that is, the generation of the set of atomic subsumptions which are entailed by some ontology. While ...
Samantha Bail, Bijan Parsia, Ulrike Sattler