Sciweavers

1407 search results - page 41 / 282
» Systems Theory Model for Information Security
Sort
View
CORR
2006
Springer
157views Education» more  CORR 2006»
13 years 8 months ago
DSmT: A new paradigm shift for information fusion
: The management and combination of uncertain, imprecise, fuzzy and even paradoxical or high conflicting sources of information has always been and still remains of primal importan...
Jean Dezert, Florentin Smarandache
WPES
2003
ACM
14 years 1 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
WWW
2005
ACM
14 years 8 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
GRC
2007
IEEE
14 years 2 months ago
MGRS in Incomplete Information Systems
The original rough set model is concerned primarily with the approximation of sets described by single binary relation on the universe. In the view of granular computing, classica...
Yuhua Qian, Jiye Liang, Chuangyin Dang
DEBS
2007
ACM
13 years 12 months ago
Towards a theory of events
Event-driven systems are used in a wide range of applications such as responding to missile attacks, interdicting potential terrorists, exploiting arbitrage opportunities and resp...
K. Mani Chandy, Michel Charpentier, Agostino Cappo...