Sciweavers

623 search results - page 29 / 125
» A proposal for Ontology Security Standards
Sort
View
IEEEARES
2010
IEEE
14 years 2 months ago
Pitfalls in Formal Reasoning about Security Protocols
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like “The service provider does not loose mo...
Nina Moebius, Kurt Stenzel, Wolfgang Reif
POLICY
2007
Springer
14 years 1 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
COMSIS
2006
100views more  COMSIS 2006»
13 years 7 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
SWAP
2008
13 years 9 months ago
Ontological Reasoning and Abductive Logic Programming for Service Discovery and Contracting
Abstract. The Service Oriented Architecture paradigm, and its implementation based on Web Services, have been the object of an intense research and standardization activity. One of...
Federico Chesani, Paola Mello, Marco Montali, Paol...
BMCBI
2006
141views more  BMCBI 2006»
13 years 7 months ago
The use of concept maps during knowledge elicitation in ontology development processes - the nutrigenomics use case
Background: Incorporation of ontologies into annotations has enabled 'semantic integration' of complex data, making explicit the knowledge within a certain field. One of...
Alexander García Castro, Philippe Rocca-Ser...