Sciweavers

2043 search results - page 103 / 409
» Reasoning About Security Models
Sort
View
113
Voted
DLOG
2008
15 years 3 months ago
Visualization of Description Logic Models
Many visualization frameworks for ontologies in general and for concept expressions in particular are too faithful to the syntax of the languages in which those objects are represe...
Fernando Náufel do Amaral, Carlos Bazilio M...
CSFW
2008
IEEE
15 years 7 months ago
Language Based Secure Communication
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
Michele Bugliesi, Riccardo Focardi
IFIP
2007
Springer
15 years 6 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
15 years 7 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
ITS
2000
Springer
135views Multimedia» more  ITS 2000»
15 years 4 months ago
Analyzing and Generating Mathematical Models: An Algebra II Cognitive Tutor Design Study
This paper reports a formative analysis of a Math Modeling Tool in the Algebra II Cognitive Tutor. This tutor is designed to support algebraic reasoning about real world problems. ...
Albert T. Corbett, Megan McLaughlin, K. Christine ...