Sciweavers

3544 search results - page 78 / 709
» Information Security in Open Systems
Sort
View
SEMWEB
2010
Springer
14 years 9 months ago
Ontology Alignment for Linked Open Data
The Web of Data currently coming into existence through the Linked Open Data (LOD) effort is a major milestone in realizing the Semantic Web vision. However, the development of app...
Prateek Jain, Pascal Hitzler, Amit P. Sheth, Kunal...
ACSAC
2006
IEEE
15 years 5 months ago
An Internet Voting System Supporting User Privacy
This work introduces the A system1 , an Internetbased, free and open source electronic voting system which employs strong cryptography. Our system is a fully functiona...
Aggelos Kiayias, Michael Korman, David Walluck
CCS
2009
ACM
15 years 11 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 4 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
CAU
2004
192views Cryptology» more  CAU 2004»
15 years 13 days ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow