Sciweavers

884 search results - page 164 / 177
» Knowledge Is Power: A View from the Semantic Web
Sort
View
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
15 years 3 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
ASWC
2006
Springer
15 years 3 months ago
Minerva: A Scalable OWL Ontology Storage and Inference System
With the increasing use of ontologies in Semantic Web and enterprise knowledge management, it is critical to develop scalable and efficient ontology management systems. In this pap...
Jian Zhou, Li Ma, Qiaoling Liu, Lei Zhang, Yong Yu...
NIPS
2008
15 years 1 months ago
Partially Observed Maximum Entropy Discrimination Markov Networks
Learning graphical models with hidden variables can offer semantic insights to complex data and lead to salient structured predictors without relying on expensive, sometime unatta...
Jun Zhu, Eric P. Xing, Bo Zhang
109
Voted
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
14 years 11 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
IMCS
2007
78views more  IMCS 2007»
14 years 11 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri