Sciweavers

1235 search results - page 11 / 247
» Formalizing information security knowledge
Sort
View
SAS
2004
Springer
132views Formal Methods» more  SAS 2004»
14 years 29 days ago
Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language
Abstract. This paper addresses the problem of checking programs written in an object-oriented language to ensure that they satisfy the information flow policies, confidentiality ...
Qi Sun, Anindya Banerjee, David A. Naumann
DEXA
2000
Springer
109views Database» more  DEXA 2000»
13 years 12 months ago
Knowledge Decay in a Normalised Knowledge Base
Knowledge ‘decay’ is a measure of the degradation of knowledge integrity. In a unified knowledge representation, data, information and knowledge are all represented in a single...
John K. Debenham
CAISE
2006
Springer
13 years 11 months ago
Validation of Regulation Documents by Automated Analysis of Formal Models
Abstract. The security of civil aviation is regulated by a series of international standards and recommended practices. The EDEMOI project aims at investigating different technique...
Didier Bert, Fabrice Bouquet, Yves Ledru, Sylvie V...
ESORICS
2002
Springer
14 years 7 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
ICSE
2007
IEEE-ACM
14 years 7 months ago
Engineering Medical Information Systems: Architecture, Data and Usability & Security
There has been increasing pressure on the health care sector to adopt information technologies to rationalize service delivery and increase service quality. Medical information sy...
Jens H. Weber-Jahnke, Morgan Price