Sciweavers

1235 search results - page 101 / 247
» Formalizing information security knowledge
Sort
View
SEKE
1995
Springer
13 years 11 months ago
Visual Scenarios for Validation of Requirements Specification
The development of a large information system is generally regarded as one of the most complex activities undertaken by organizations and it is dependent on the communication and u...
V. Lalioti, Babis Theodoulidis
ECIS
2001
13 years 9 months ago
Barriers to effective knowledge management: Action Research Meets Grounded Theory
Despite evidence that the majority of knowledge management (KM) initiatives miscarry, there has been a paucity of critical, in-depth research into the causes of failure. In this p...
David Graham Wastell
CCS
2007
ACM
14 years 2 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
ICCS
2009
Springer
14 years 2 months ago
Distinguishing Answers in Conceptual Graph Knowledge Bases
Abstract. In knowledge bases, the open world assumption and the ability to express variables may lead to an answer redundancy problem. This problem occurs when the returned answers...
Nicolas Moreau, Michel Leclère, Madalina Cr...
AEI
2004
114views more  AEI 2004»
13 years 7 months ago
Physical concept ontology for the knowledge intensive engineering framework
Knowledge intensive engineering aims at flexible applications of a variety of product life cycle knowledge, such as design, manufacturing, operations, maintenance, and recycling. ...
Masaharu Yoshioka, Yasushi Umeda, Hideaki Takeda, ...