Sciweavers

1235 search results - page 150 / 247
» Formalizing information security knowledge
Sort
View
COSIT
1997
Springer
131views GIS» more  COSIT 1997»
14 years 22 hour ago
Cognitive Requirements on Making and Interpreting Maps
We present an approach to modeling human interpretation of (real) geographic maps. While in Geographic Information Systems (GIS) the limitations for describing geographic knowledge...
Thomas Barkowsky, Christian Freksa
ACMICEC
2006
ACM
120views ECommerce» more  ACMICEC 2006»
13 years 11 months ago
A semantic-based fully visual application for matchmaking and query refinement in B2C e-marketplaces
This paper presents a visual application in the framework of semantic-enabled e-marketplaces aimed at fully exploiting semantics of supply/demand descriptions in B2C and C2C e-mar...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...
ENTCS
2007
110views more  ENTCS 2007»
13 years 7 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
14 years 4 months ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
14 years 1 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...