Sciweavers

1235 search results - page 9 / 247
» Formalizing information security knowledge
Sort
View
AWIC
2003
Springer
14 years 25 days ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
CCS
2008
ACM
13 years 9 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
CORR
2011
Springer
216views Education» more  CORR 2011»
13 years 2 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
IJFCS
2008
98views more  IJFCS 2008»
13 years 7 months ago
On Succinct Representation of Knowledge Community Taxonomies with Formal Concept Analysis
We present an application of formal concept analysis aimed at representing a meaningful structure of knowledge communities in the form of a lattice-based taxonomy. The taxonomy gr...
Camille Roth, Sergei A. Obiedkov, Derrick G. Kouri...
CAI
2006
Springer
13 years 7 months ago
Formal Verification of Security Model Using SPR Tool
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes...
Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D....