Sciweavers

1235 search results - page 65 / 247
» Formalizing information security knowledge
Sort
View
FOCS
2010
IEEE
13 years 6 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
ATAL
2005
Springer
14 years 1 months ago
How Bee-Like Agents Support Cultural Heritage
Abstract. Elderly people are a great repository of knowledge, the majority of which has never been gathered by formal means. In this paper we introduce an application of multi-agen...
Martí Fàbregas, Beatriz López...
MKM
2005
Springer
14 years 1 months ago
Translating Mathematical Vernacular into Knowledge Repositories
Abstract. Defining functions is a major topic when building mathematical repositories. Though relatively easy in mathematical vernacular, function definitions rise a number of qu...
Adam Grabowski, Christoph Schwarzweller
JTAER
2006
100views more  JTAER 2006»
13 years 8 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
CIMCA
2006
IEEE
14 years 2 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet