Sciweavers

1235 search results - page 39 / 247
» Formalizing information security knowledge
Sort
View
EKAW
2000
Springer
15 years 6 months ago
Conflict Resolution in the Collaborative Design of Terminological Knowledge Bases
Designing a terminological knowledge base consists in collecting terms and associating them to their definition. Our objective is to define a process model to support this design ...
Gilles Falquet, Claire-Lise Mottaz Jiang
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
15 years 7 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
ESWA
2008
155views more  ESWA 2008»
15 years 2 months ago
Using GHSOM to construct legal maps for Taiwan's securities and futures markets
A good legal knowledge representation system, capable of effectively providing investors with comprehensive legal knowledge, is needed for investors to prevent erratic behavior be...
Jen-Ying Shih, Yu-Jung Chang, Wun-Hwa Chen
TSE
2008
107views more  TSE 2008»
15 years 2 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
ETRICS
2006
15 years 6 months ago
Possibilistic Information Flow Control in MAKS and Action Refinement
Abstract. Formal methods emphasizes the need for a top-down approach when developing large reliable software systems. Refinements are map step by step abstract algebraic specificat...
Dieter Hutter