Reusing existing web resources for e-learning is a very promising and highly promoted idea in the research field of web-based education, especially for intelligent or adaptive sys...
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...
Translations to (first-order) datalog have been used in a number of inferencing techniques for description logics (DLs), yet the relationship between the semantic expressivities o...
One of the challenges faced by network management systems is the increasing need for consistent management of physical network equipment. We propose a solution where equipment is m...
Krzysztof Miksa, Marek Kasztelnik, Pawel Sabina, T...
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...