Sciweavers

1235 search results - page 152 / 247
» Formalizing information security knowledge
Sort
View
AAAI
2000
13 years 9 months ago
A Consistency-Based Model for Belief Change: Preliminary Report
We present a general, consistency-based framework for belief change. Informally, in revising K by , we begin with and incorporate as much of K as consistently possible. Formally, ...
James P. Delgrande, Torsten Schaub
IEEEARES
2007
IEEE
14 years 2 months ago
Static evaluation of Certificate Policies for GRID PKIs interoperability
Validating an end-entity X.509 digital certificate prior to authorizing it for using a resource into the computational Grid has become a widely studied topic due to its importance...
Valentina Casola, Nicola Mazzocca, Jesus Luna, Osc...
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
HICSS
2007
IEEE
88views Biometrics» more  HICSS 2007»
14 years 2 months ago
Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center
As a Center of Academic Excellence (CAE) in Information Assurance Education, the University of Alaska Fairbanks is committed to promoting a culture of awareness and advancement of...
Kara L. Nance, Brian Hay, Christopher Hecker
IFIPTM
2010
140views Management» more  IFIPTM 2010»
13 years 6 months ago
Shinren: Non-monotonic Trust Management for Distributed Systems
Abstract. The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust ma...
Changyu Dong, Naranker Dulay