Sciweavers

1235 search results - page 81 / 247
» Formalizing information security knowledge
Sort
View
HCI
2007
13 years 9 months ago
Incorporating the Cultural Dimensions into the Theoretical Framework of Website Information Architecture
Information Architecture (IA) has emerged as a discipline that is concerned with the development of systematic approaches to the presentation and organization of online information...
Wan Abdul Rahim Wan Mohd Isa, Nor Laila Md. Noor, ...
ENTCS
2000
112views more  ENTCS 2000»
13 years 7 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 8 months ago
A Directed Signature Scheme Based on RSA Assumption
A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signe...
Rongxing Lu, Zhenfu Cao
CSFW
1995
IEEE
13 years 11 months ago
Composing and decomposing systems under security properties
We investigate the formal relationship between separability of processes and the types of non-interference properties they enjoy. Though intuitively appealing, separability – th...
A. W. Roscoe, L. Wulf
BCSHCI
2008
13 years 9 months ago
Are you searching for ways to find information?
Effective information retrieval is important not only for its own sake but also for improving our understanding and allowing us to evolve our information into knowledge and wisdom...
Colin Bird