Sciweavers

1235 search results - page 103 / 247
» Formalizing information security knowledge
Sort
View
100
Voted
CHI
2005
ACM
16 years 2 months ago
Towards knowledge building in professional groups
In this submission for the CHI05 Development forum, I reflect on my experience leading the Experience Design community of interest of the American Institute of Graphic Arts and su...
John Zapolski
121
Voted
JUCS
2008
113views more  JUCS 2008»
15 years 2 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
IEEECIT
2010
IEEE
15 years 10 days ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
EKAW
2006
Springer
15 years 6 months ago
Distributed Multi-contextual Ontology Evolution - A Step Towards Semantic Autonomy
In today's world there is a need for knowledge infrastructures that can support several autonomous knowledge bases all using different ontologies and constantly adapting thes...
Maciej Zurawski
CSFW
2003
IEEE
15 years 7 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows