Sciweavers

1235 search results - page 188 / 247
» Formalizing information security knowledge
Sort
View
DIM
2006
ACM
14 years 1 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
WWW
2007
ACM
14 years 8 months ago
BOWiki - a Collaborative Annotation and Ontology Curation Framework
As the amount of data being generated in biology has increased, a major challenge has been how to store and represent this data in a way that makes it easily accessible to researc...
Michael Backhaus, Janet Kelso, Joshua Bacher, Hein...
ESWS
2009
Springer
14 years 2 months ago
MoKi: The Enterprise Modelling Wiki
Abstract. Enterprise modelling focuses on the construction of a structured description, the so-called enterprise model, which represents aspects relevant to the activity of an ente...
Chiara Ghidini, Barbara Kump, Stefanie N. Lindstae...
KCAP
2011
ACM
12 years 10 months ago
Let's agree to disagree: on the evaluation of vocabulary alignment
Gold standard mappings created by experts are at the core of alignment evaluation. At the same time, the process of manual evaluation is rarely discussed. While the practice of ha...
Anna Tordai, Jacco van Ossenbruggen, Guus Schreibe...
WWW
2005
ACM
14 years 8 months ago
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact wit...
Mudhakar Srivatsa, Li Xiong, Ling Liu