Sciweavers

410 search results - page 27 / 82
» Making norms concrete
Sort
View
DEXAW
2002
IEEE
99views Database» more  DEXAW 2002»
14 years 16 days ago
Using Preference Order in Ontologies
The latest ontology languages can be translated into a description logic (DL), thus providing them with a formal semantics and associated reasoning procedures. We introduce the or...
Stijn Heymans, Dirk Vermeir
GI
2001
Springer
14 years 1 days ago
Private Information Retrieval
In e-commerce, the protection of user privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated recently. A PIR protocol a...
Dmitri Asonov
RE
2001
Springer
13 years 12 months ago
Goal-Oriented Requirements Engineering: A Guided Tour
pture, at different levels of abstraction, the various objectives the system under consideration should achieve. Goal-oriented requirements engineering is concerned with the use o...
Axel van Lamsweerde
ACSAC
2000
IEEE
13 years 12 months ago
A Policy-based Access Control Mechanism for the Corporate Web
Current Web technologies use access control lists (ACLs) for enforcing regulations and practices governing businesses today. Having the policy hard-coded into ACLs causes manageme...
Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky
ICCCN
1998
IEEE
13 years 11 months ago
On the Vulnerabilities and Protection of OSPF Routing Protocol
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Feiyi Wang, Shyhtsun Felix Wu