Sciweavers

1235 search results - page 38 / 247
» Formalizing information security knowledge
Sort
View
AIED
2005
Springer
15 years 8 months ago
Towards support in building qualitative knowledge models
Qualitative Reasoning (QR) formalisms provide ontological primitives for capturing conceptual knowledge. Recently QR-based diagrammatic tools are being developed to support learne...
Vania Bessa Machado, Roland Groen, Bert Bredeweg
167
Voted
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 6 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
94
Voted
CRYPTO
2000
Springer
110views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
Parallel Reducibility for Information-Theoretically Secure Computation
Secure Function Evaluation (SFE) protocols are very hard to design, and reducibility has been recognized as a highly desirable property of SFE protocols. Informally speaking, reduc...
Yevgeniy Dodis, Silvio Micali
APCCM
2006
15 years 3 months ago
The formal semantics of the timeER model
A wide range of database applications manage information that varies over time. Many of the underlying database schemas of these were designed using one of the several versions of...
Heidi Gregersen
FM
2008
Springer
130views Formal Methods» more  FM 2008»
15 years 3 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...