Sciweavers

1235 search results - page 96 / 247
» Formalizing information security knowledge
Sort
View
ISMB
1993
13 years 9 months ago
Integrating Order and Distance Relationships from Heterogeneous Maps
There is no automatic mechanism to integrate information between heterogeneous genome maps. Currently, integration is a di cult, manual process. We have developed a process for kn...
Mark Graves
ACSAC
2000
IEEE
14 years 13 days ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
ITRUST
2005
Springer
14 years 1 months ago
Modeling Social and Individual Trust in Requirements Engineering Methodologies
Abstract. When we model and analyze trust in organizations or information systems we have to take into account two different levels of analysis: social and individual. Social leve...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
ERSHOV
2003
Springer
14 years 1 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
KCAP
2005
ACM
14 years 1 months ago
A case study of wiki-based experience repository at a medium-sized software company
The paper reports on an exploratory case study where an organizational learning methodology was used to support knowledge sharing in a medium-sized distributed software developmen...
Thomas Chau, Frank Maurer