Sciweavers

1235 search results - page 105 / 247
» Formalizing information security knowledge
Sort
View
MKM
2007
Springer
14 years 2 months ago
Biform Theories in Chiron
An axiomatic theory represents mathematical knowledge declaratively as a set of axioms. An algorithmic theory represents mathematical knowledge procedurally as a set of algorithms....
William M. Farmer
ASM
2010
ASM
13 years 10 months ago
Applying the B Method for the Rigorous Development of Smart Card Applications
Abstract. Smart Card applications usually require reliability and security to avoid incorrect operation or access violation in transactions and corruption or undue access to stored...
Bruno Emerson Gurgel Gomes, David Déharbe, ...
ETRICS
2006
13 years 11 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
SPIESR
2004
171views Database» more  SPIESR 2004»
13 years 9 months ago
Interactive segmentation with hidden object-based annotations: toward smart media
In this paper a novel "Smart Media" concept for semantic-based multimedia security and management is proposed. This concept is based on interactive object segmentation (...
Yuriy Rytsar, Sviatoslav Voloshynovskiy, Fré...
KCAP
2009
ACM
14 years 2 months ago
Modeling multiple-event situations across news articles
Readers interested in the context of an event covered in the news such as the dismissal of a lawsuit can benefit from easily finding out about the overall news situation, the lega...
Earl J. Wagner, Larry Birnbaum, Kenneth D. Forbus