Sciweavers

1235 search results - page 19 / 247
» Formalizing information security knowledge
Sort
View
DELOS
2000
13 years 9 months ago
Knowledge Representation meets Digital Libraries
In this short paper, the basic ideas behind a project on the application of Knowledge Representation formalisms and technologies for Conceptual Modelling and Query Management are ...
Enrico Franconi
CAISE
2000
Springer
13 years 12 months ago
A Formal Model for Business Process Modeling and Design
We present a formal framework for representing enterprise knowledge. The concepts of our framework (objectives and goals, roles and actors, actions and processes, responsibilities ...
Manolis Koubarakis, Dimitris Plexousakis
FLAIRS
2006
13 years 9 months ago
Automated Population of Cyc: Extracting Information about Named-entities from the Web
Populating the Cyc Knowledge Base (KB) has been a manual process until very recently. However, there is currently enough knowledge in Cyc for it to be feasible to attempt to acqui...
Purvesh Shah, David Schneider, Cynthia Matuszek, R...
CSFW
2004
IEEE
13 years 11 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
ITRUST
2004
Springer
14 years 1 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...