Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Abstract. We propose an approach for extending both the terminological and the assertional part of a Description Logic knowledge base by using information provided by the knowledge...
Franz Baader, Bernhard Ganter, Baris Sertkaya, Ulr...
We consider expansions of the Abadi-Rogaway logic of indistinguishability of formal cryptographic expressions. We expand the logic in order to cover cases when partial information...
The application of a knowledge management strategy does not take place in a vacuum. Successfully meeting objectives of a knowledge management strategy may depend not only on the e...
Tony Jewels, Alan Underwood, Carmen de Pablos Here...