Sciweavers

1235 search results - page 50 / 247
» Formalizing information security knowledge
Sort
View
LICS
2006
IEEE
14 years 1 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
SEKE
2007
Springer
14 years 1 months ago
A Model-driven Approach to Architecting Secure Software
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
JCP
2008
206views more  JCP 2008»
13 years 7 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
WWW
2007
ACM
14 years 8 months ago
Computer-Supported Collaborative Knowledge Modeling in Ecology
We describe collaborative efforts between a knowledge representation team, a community of scientists, and scientific information managers in developing knowledge models for ecolog...
Deana Pennington, Joshua S. Madin, Ferdinando Vill...
IEEEICCI
2006
IEEE
14 years 1 months ago
SenseNet: A Knowledge Representation Model for Computational Semantics
Knowledge representation is essential for semantics modeling and intelligent information processing. For decades researchers have proposed many knowledge representation techniques...
Ping Chen, Wei Ding 0003, Chengmin Ding