Sciweavers

1235 search results - page 126 / 247
» Formalizing information security knowledge
Sort
View
IDA
2006
Springer
13 years 8 months ago
Supporting bi-cluster interpretation in 0/1 data by means of local patterns
Clustering or co-clustering techniques have been proved useful in many application domains. A weakness of these techniques remains the poor support for grouping characterization. ...
Ruggero G. Pensa, Céline Robardet, Jean-Fra...
CCS
2009
ACM
14 years 8 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
ACISP
2009
Springer
14 years 2 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
EKAW
2010
Springer
13 years 6 months ago
TagSorting: A Tagging Environment for Collaboratively Building Ontologies
Social Tagging Systems (STS) empower users to classify and organize resources and to improve the retrieval performance over the tagged resources. In this paper we argue that the po...
Leyla Jael García-Castro, Martin Hepp, Alex...
FOMI
2009
13 years 5 months ago
Modular Ontologies for Architectural Design
Abstract. The design of architectural environments has to take into account various sources of heterogeneous information. Not only quantitative spatial constraints and qualitative ...
Joana Hois, Mehul Bhatt, Oliver Kutz