Sciweavers

1235 search results - page 16 / 247
» Formalizing information security knowledge
Sort
View
EKAW
2004
Springer
14 years 1 months ago
Managing Patient Record Instances Using DL-Enabled Formal Concept Analysis
Abstract In this paper we describe a general logic-enabled Formal Concept Analysis (FCA) approach to manage patient record instances. In particular, the conceptual model of the dom...
Bo Hu, Srinandan Dasmahapatra, David Dupplaw, Paul...
IJAR
2006
241views more  IJAR 2006»
13 years 7 months ago
Spatial reasoning under imprecision using fuzzy set theory, formal logics and mathematical morphology
In spatial reasoning, in particular for applications in image understanding, structure recognition and computer vision, a lot of attention has to be paid to spatial relationships ...
Isabelle Bloch
SAS
2005
Springer
14 years 1 months ago
Secure Information Flow as a Safety Problem
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D’Argenio, and Rezk coined th...
Tachio Terauchi, Alexander Aiken
ASM
2008
ASM
13 years 9 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
ICEGOV
2007
ACM
13 years 11 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...