Sciweavers

1235 search results - page 8 / 247
» Formalizing information security knowledge
Sort
View
CCS
2005
ACM
14 years 1 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 29 days ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
EKAW
1999
Springer
13 years 12 months ago
Formally Verifying Dynamic Properties of Knowledge Based Systems
Abstract. In this paper we study dynamic properties of knowledge-based systems. We argue the importance of such dynamic properties for the construction and analysis of knowledge-ba...
Perry Groot, Annette ten Teije, Frank van Harmelen
BIS
2009
112views Business» more  BIS 2009»
13 years 5 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
CII
2008
100views more  CII 2008»
13 years 7 months ago
Knowledge formalization in experience feedback processes: An ontology-based approach
Because of the current trend of integration and interoperability of industrial systems, their size and complexity continue to grow making it more difficult to analyze, to understa...
Bernard Kamsu Foguem, Thierry Coudert, C. Bé...