Sciweavers

1235 search results - page 17 / 247
» Formalizing information security knowledge
Sort
View
ESOP
2008
Springer
13 years 9 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
ISF
2007
104views more  ISF 2007»
13 years 7 months ago
Overcoming organizational challenges to secure knowledge management
—Successful secure knowledge management requires consideration of both technical and organizational concerns. We use the example of existing industrial incident management system...
Finn Olav Sveen, Eliot Rich, Matthew Jager
IEEEARES
2008
IEEE
14 years 2 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
CORR
2004
Springer
105views Education» more  CORR 2004»
13 years 7 months ago
Mathematical knowledge management is needed
In this lecture I discuss some aspects of MKM, Mathematical Knowledge Management, with particuar emphasis on information storage and information retrieval. MSCS: 68P20, 68T30 Key w...
Michiel Hazewinkel
IJISEC
2007
149views more  IJISEC 2007»
13 years 7 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers