Sciweavers

1235 search results - page 151 / 247
» Formalizing information security knowledge
Sort
View
CIKM
2008
Springer
13 years 9 months ago
Efficient techniques for document sanitization
Sanitization of a document involves removing sensitive information from the document, so that it may be distributed to a broader audience. Such sanitization is needed while declas...
Venkatesan T. Chakaravarthy, Himanshu Gupta, Prasa...
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 2 months ago
A Virtual Password Scheme to Protect Passwords
—People enjoy the convenience of on-line services, but online environments may bring many risks. In this paper, we discuss how to prevent users’ passwords from being stolen by ...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...
ISI
2007
Springer
14 years 2 months ago
Architecture for an Automatic Customized Warning System
Abstract—Public communication during natural and manmade disasters is a key issue that must be addressed to protect lives and properties. The choice of the best protective action...
Mirko Montanari, Sharad Mehrotra, Nalini Venkatasu...
ISI
2008
Springer
13 years 7 months ago
Visual Analytics for Supporting Entity Relationship Discovery on Text Data
To conduct content analysis over text data, one may look out for important named objects and entities that refer to real world instances, synthesizing them into knowledge relevant ...
Hanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw, HweeHwa...
ER
2007
Springer
187views Database» more  ER 2007»
14 years 2 months ago
Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study
New technologies used in biology are generating huge quantities of data; up to two petabytes of overall data are to be expected by the end of the decade. Modern biology also has t...
Marie-Noëlle Terrasse, Marinette Savonnet, Er...