Sciweavers

1235 search results - page 27 / 247
» Formalizing information security knowledge
Sort
View
ESWS
2008
Springer
13 years 9 months ago
A Natural Language Query Interface to Structured Information
Accessing structured data such as that encoded in ontologies and knowledge bases can be done using either syntactically complex formal query languages like SPARQL or complicated fo...
Valentin Tablan, Danica Damljanovic, Kalina Bontch...
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 9 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
ACSAC
2001
IEEE
13 years 11 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
ETS
2002
IEEE
144views Hardware» more  ETS 2002»
13 years 7 months ago
Creating Shared Knowledge: Instructional Knowledge Management Systems
Document management, information management, and knowledge management are three processes of an instructional knowledge management system (IKMS) that require different ways of thi...
Gerald S. Edmonds, Rob Pusch
IJSSE
2011
127views more  IJSSE 2011»
13 years 2 months ago
A Formal Language for XML Authorisations Based on Answer Set Programming and Temporal Interval Logic Constraints
The Extensible Markup Language is susceptible to security breaches because it does not incorporate methods to protect the information it encodes. Our work presented in this paper f...
Sean Policarpio, Yan Zhang