Sciweavers

1235 search results - page 38 / 247
» Formalizing information security knowledge
Sort
View
AIED
2005
Springer
14 years 1 months ago
Towards support in building qualitative knowledge models
Qualitative Reasoning (QR) formalisms provide ontological primitives for capturing conceptual knowledge. Recently QR-based diagrammatic tools are being developed to support learne...
Vania Bessa Machado, Roland Groen, Bert Bredeweg
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
CRYPTO
2000
Springer
110views Cryptology» more  CRYPTO 2000»
14 years 1 days ago
Parallel Reducibility for Information-Theoretically Secure Computation
Secure Function Evaluation (SFE) protocols are very hard to design, and reducibility has been recognized as a highly desirable property of SFE protocols. Informally speaking, reduc...
Yevgeniy Dodis, Silvio Micali
APCCM
2006
13 years 9 months ago
The formal semantics of the timeER model
A wide range of database applications manage information that varies over time. Many of the underlying database schemas of these were designed using one of the several versions of...
Heidi Gregersen
FM
2008
Springer
130views Formal Methods» more  FM 2008»
13 years 9 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...