Sciweavers

1235 search results - page 32 / 247
» Formalizing information security knowledge
Sort
View
FSS
2007
176views more  FSS 2007»
13 years 7 months ago
Set approximations in fuzzy formal concept analysis
Formal concept analysis and rough set theory are two important tools in knowledge representation and knowledge discovery in relational information systems. The purpose of this pap...
Ming-Wen Shao, Min Liu, Wen-Xiu Zhang
AAAI
2011
12 years 7 months ago
Transportability of Causal and Statistical Relations: A Formal Approach
We address the problem of transferring information learned from experiments to a different environment, in which only passive observations can be collected. We introduce a formal ...
Judea Pearl, Elias Bareinboim
ISSA
2008
13 years 9 months ago
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing
The approach to information security governance has predominantly followed a functionalist paradigm with emphasis placed on formalized rule structures and policy frameworks. The a...
Kennedy Njenga, Irwin Brown
CASSIS
2004
Springer
14 years 1 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
ISTA
2004
13 years 9 months ago
On a Network Forensics Model For Information Security
: The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Networ...
Wei Ren