Sciweavers

1235 search results - page 20 / 247
» Formalizing information security knowledge
Sort
View
102
Voted
SPW
1997
Springer
15 years 6 months ago
Secure Books: Protecting the Distribution of Knowledge
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
Ross J. Anderson, Václav Matyás Jr.,...
122
Voted
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
15 years 8 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
ESORICS
2008
Springer
15 years 4 months ago
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Abstract. We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret informati...
Michael Backes, Boris Köpf
ISI
2004
Springer
15 years 7 months ago
The Architecture of the Cornell Knowledge Broker
Intelligence applications have to process massive amounts of data in order to extract relevant information. This includes archived historical data as well as continuously arriving ...
Alan J. Demers, Johannes Gehrke, Mirek Riedewald
126
Voted
CORR
2006
Springer
143views Education» more  CORR 2006»
15 years 2 months ago
A Knowledge-Based Approach for Selecting Information Sources
Through the Internet and the World-Wide Web, a vast number of information sources has become available, which offer information on various subjects by different providers, often i...
Thomas Eiter, Michael Fink, Hans Tompits