Sciweavers

1235 search results - page 11 / 247
» Formalizing information security knowledge
Sort
View
SAS
2004
Springer
132views Formal Methods» more  SAS 2004»
15 years 7 months ago
Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language
Abstract. This paper addresses the problem of checking programs written in an object-oriented language to ensure that they satisfy the information flow policies, confidentiality ...
Qi Sun, Anindya Banerjee, David A. Naumann
DEXA
2000
Springer
109views Database» more  DEXA 2000»
15 years 6 months ago
Knowledge Decay in a Normalised Knowledge Base
Knowledge ‘decay’ is a measure of the degradation of knowledge integrity. In a unified knowledge representation, data, information and knowledge are all represented in a single...
John K. Debenham
CAISE
2006
Springer
15 years 6 months ago
Validation of Regulation Documents by Automated Analysis of Formal Models
Abstract. The security of civil aviation is regulated by a series of international standards and recommended practices. The EDEMOI project aims at investigating different technique...
Didier Bert, Fabrice Bouquet, Yves Ledru, Sylvie V...
ESORICS
2002
Springer
16 years 1 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
132
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Engineering Medical Information Systems: Architecture, Data and Usability & Security
There has been increasing pressure on the health care sector to adopt information technologies to rationalize service delivery and increase service quality. Medical information sy...
Jens H. Weber-Jahnke, Morgan Price