Sciweavers

436 search results - page 29 / 88
» Arguing for gaining access to information
Sort
View
BIRTHDAY
2006
Springer
15 years 3 months ago
Computational Logic in an Object-Oriented World
Logic and object-orientation (OO) are competing ways of looking at the world. Both view the world in terms of individuals. But logic focuses on the relationships between individual...
Bob Kowalski
ICICS
2005
Springer
15 years 5 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
IH
1998
Springer
15 years 4 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
ICCS
2009
Springer
15 years 6 months ago
Semantic Search - Using Graph-Structured Semantic Models for Supporting the Search Process
Semantic search attempts to go beyond the current state of the art in information access by addressing information needs on the semantic level, i.e. considering the meaning of user...
Thanh Tran, Peter Haase, Rudi Studer
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
15 years 5 months ago
Advanced Indexing Techniques for Wide-Area Network Monitoring
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...