Sciweavers

1235 search results - page 49 / 247
» Formalizing information security knowledge
Sort
View
JUCS
2010
167views more  JUCS 2010»
13 years 6 months ago
Ontology based Approach in Knowledge Sharing Measurement
: For many years, physical asset indicators were the main evidence of an organization’s successful performance. However, the situation has changed following the revolution of inf...
Behrang Zadjabbari, Pornpit Wongthongtham, Farookh...
IEEEIAS
2007
IEEE
14 years 2 months ago
Modeling Security Protocols as Games
We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type ...
Mohamed Saleh, Mourad Debbabi
SUM
2010
Springer
13 years 5 months ago
A Formal Analysis of Logic-Based Argumentation Systems
Dung's abstract argumentation model consists of a set of arguments and a binary relation encoding attacks among arguments. Different acceptability semantics have been defined ...
Leila Amgoud, Philippe Besnard
IFIP
1992
Springer
13 years 11 months ago
Intelligent Access to Data and Knowledge Bases via User's Topics of Interest
Retrieving relevant information in Data and Knowledge Bases containing a large number of di erent types of information is a non trivial problem. That is the reason why, in areas l...
Sylvie Cazalens, Robert Demolombe
IEEEIAS
2008
IEEE
14 years 2 months ago
Challenges for Security Typed Web Scripting Languages Design
: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan