Sciweavers

407 search results - page 6 / 82
» An Ontology-based Approach to the Formalization of Informati...
Sort
View
CRITIS
2007
13 years 9 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
14 years 8 months ago
Ontology-Based Constraint Recognition for Free-Form Service Requests
Automatic recognition and formalization of constraints from free-form service requests is a challenging problem. Its resolution would go a long way toward allowing users to make r...
Muhammed Al-Muhammed, David W. Embley
CAISE
2005
Springer
14 years 24 days ago
Ontology Based Business Process Description
Coupling of cross-organizational business processes in electronic markets is a difficult and time-consuming task. In practice business processes are geographically distributed whic...
Agnes Koschmider, Andreas Oberweis
JCP
2008
116views more  JCP 2008»
13 years 7 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
EMSOFT
2004
Springer
14 years 22 days ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter