Sciweavers

1235 search results - page 12 / 247
» Formalizing information security knowledge
Sort
View
ECAI
2006
Springer
13 years 11 months ago
Bridging the Gap Between Informal and Formal Guideline Representations
Abstract. Clinical guidelines are important means to improve quality of health care while limiting cost and supporting the medical staff. They are written as free text with tables ...
Andreas Seyfang, Silvia Miksch, Mar Marcos, Joland...
CIKM
2010
Springer
13 years 5 months ago
Anonymizing data with quasi-sensitive attribute values
We study the problem of anonymizing data with quasi-sensitive attributes. Quasi-sensitive attributes are not sensitive by themselves, but certain values or their combinations may ...
Pu Shi, Li Xiong, Benjamin C. M. Fung
FROCOS
2007
Springer
14 years 1 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
SIGLEX
1991
13 years 11 months ago
General Lexical Representation for an Effect Predicate
This paper argues that there is no reason to distinguish between lexical information and real-world information on the basis of the formalisms used; that both types of knowledge c...
Martha Stone Palmer
WWW
2005
ACM
14 years 8 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...