Sciweavers

1235 search results - page 103 / 247
» Formalizing information security knowledge
Sort
View
110
Voted
CHI
2005
ACM
16 years 3 months ago
Towards knowledge building in professional groups
In this submission for the CHI05 Development forum, I reflect on my experience leading the Experience Design community of interest of the American Institute of Graphic Arts and su...
John Zapolski
JUCS
2008
113views more  JUCS 2008»
15 years 3 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
IEEECIT
2010
IEEE
15 years 1 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
EKAW
2006
Springer
15 years 7 months ago
Distributed Multi-contextual Ontology Evolution - A Step Towards Semantic Autonomy
In today's world there is a need for knowledge infrastructures that can support several autonomous knowledge bases all using different ontologies and constantly adapting thes...
Maciej Zurawski
CSFW
2003
IEEE
15 years 8 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows