Sciweavers

1235 search results - page 189 / 247
» Formalizing information security knowledge
Sort
View
CCS
2005
ACM
14 years 1 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 11 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
KCAP
2005
ACM
14 years 1 months ago
An Approach to Ontology Mapping Negotiation
Ontology mapping negotiation aims to achieve consensus among real-world entities about the process of transforming information between different models (ontologies). This paper de...
Nuno Silva, Paulo Maio, João Rocha
EGOV
2008
Springer
13 years 9 months ago
Paving the Way to eGovernment Transformation: Interoperability Registry Infrastructure Development
During the last decades eGovernment has been a vivid, dynamic research and development area. As services are being transformed, electronic documents and web services appear every d...
Aikaterini-Maria Sourouni, Fenareti Lampathaki, Sp...
WWW
2006
ACM
14 years 8 months ago
Determining user interests about museum collections
Currently, there is an increasing effort to provide various personalized services on museum web sites. This paper presents an approach for determining user interests in a museum c...
Lloyd Rutledge, Lora Aroyo, Natalia Stash