Semantic security

Results: 252



#Item
71Computing / Identity management / RDF / Context awareness / PERMIS / Policy analysis / Ontology / Role-based access control / Web Ontology Language / Security / Semantic Web / Access control

A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments Alessandra Toninelli1, Rebecca Montanari1, Lalana Kagal2, and Ora Lassila3, 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2006-09-07 14:22:35
72Data collection / Intelligence / Intelligence gathering disciplines / Computing / Conceptual interoperability / Signals intelligence / Semantic interoperability / Geographic information system / System of systems / Telecommunications / National security / Interoperability

Time to Open Up EW and SIGINT By Gordon Hunt and Dr. Ronald Meixner The Journal of Electronic Defense | December

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2014-11-27 00:45:13
73Software / Firewall / Distributed firewall / Iptables / Description logic / Netfilter / Semantic Web Rule Language / PF / Comparison of firewalls / Computer network security / System software / Computing

Confident Firewall Policy Configuration Management using Description Logic ´ Foghl´ William M. Fitzgerald1,2 Simon N. Foley2 M´ıche´ al O u1

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2007-10-22 09:19:27
74Knowledge representation / Semantic Web / Science / Knowledge engineering / Cyber-physical system / Ontology / CPS / Information science / Technical communication / Information

A Survey and Taxonomy for Roots of Trust in Cyber-Physical Systems Summary of Results November 2014 About the Project This pilot research project, sponsored by the Cyber Security Research Alliance, was designed to survey

Add to Reading List

Source URL: www.cybersecurityresearch.org

Language: English - Date: 2014-11-07 04:59:46
75Science / Knowledge representation / Semantic Web / Technical communication / Data / Upper ontology / Web Ontology Language / Network security / DMZ / Ontology / Information / Information science

PDF Document

Add to Reading List

Source URL: security.polito.it

Language: English - Date: 2012-02-10 09:52:47
76Knowledge representation / Technical communication / Science / Computing / Ontology / Network security / DMZ / Web Ontology Language / Upper ontology / Information / Semantic Web / Information science

PDF Document

Add to Reading List

Source URL: security.polito.it

Language: English - Date: 2012-12-05 12:05:13
77Public-key cryptography / Key encapsulation / Ciphertext indistinguishability / Cipher / Cryptographic protocol / Semantic security / Key / Standard model / Transport Layer Security / Cryptography / ID-based encryption / Advantage

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-30 11:15:58
78Commitment scheme / Advantage / Ciphertext indistinguishability / Secure multi-party computation / RSA / Semantic security / Cryptography / Cryptographic protocols / Universal composability

Games and the Impossibility of Realizable Ideal Functionality Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Ajith Ramanathan1 , and Andre Scedrov2 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:29:59
79Identifiers / Universal identifiers / Data modeling / Linked data / Semantic Web / World Wide Web / Globally unique identifier / Linkage / Unique key / Software engineering / Computing / Information

Data Linking Deterministic linking and linkage keys The simplest form of deterministic linking uses a unique identifier, such as an Australian Business Number or a social security number, to determine if the records refe

Add to Reading List

Source URL: nss.gov.au

Language: English - Date: 2014-07-17 21:43:55
80Ciphertext / RSA / Block cipher modes of operation / Cipher / ElGamal encryption / Semantic security / Symmetric-key algorithm / Blum–Goldwasser cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
UPDATE