Sciweavers

1235 search results - page 114 / 247
» Formalizing information security knowledge
Sort
View
CONTEXT
2007
Springer
14 years 2 months ago
Context Modeling: Context as a Dressing of a Focus
Contextual Graphs are a context-based formalism used in various real-world applications. They allow a uniform representation of elements of reasoning and of contexts for describing...
Juliette Brézillon, Patrick Brézillo...
GLOBECOM
2010
IEEE
13 years 6 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
IWFM
2003
13 years 9 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
IJMMS
2000
85views more  IJMMS 2000»
13 years 7 months ago
Ontology-driven document enrichment: principles, tools and applications
In this paper we present an approach to document enrichment, which consists of developing and integrating formal knowledge models with archives of documents, to provide intelligent...
Enrico Motta, Simon Buckingham Shum, John Domingue
TKDE
2008
122views more  TKDE 2008»
13 years 7 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu