Filters








116,121 Hits in 5.5 sec

Digital Transformation of Russia Energy Sector: Methods and Intelligent Technologies of Scientific Substantiation of Strategic Decisions

Lyudmila V. Massel, Aleksei G. Massel, C. Rehtanz, N. Voropai
2019 EPJ Web of Conferences  
An approach is proposed to solve the problem of integration of software, information support and intelligent information technologies developed at Melentiev Energy Systems Institute of SB RAS.  ...  The problem of insufficient use of the results available in scientific organizations of the energy profile is highlighted.  ...  semantic models, of situational management concept, of agent, cloud and intelligent computing. The results were obtained as part of the implementation of the ISEM SB RAS project no.  ... 
doi:10.1051/epjconf/201921701011 fatcat:dmsb3kmmdnhrhjblffxepjjeem

Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government

Md. Headayetullah, G.K Pradhan, Sanjay Biswas, B Puthal
2011 International Journal of Computer Science & Information Technology (IJCSIT)  
Information security is nothing but defending information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.  ...  In this paper, we try to develop a secure information sharing approach for digital government to improve home land security.  ...  Below, Table 1 depicts the results obtained from the experimentation on the proposed secure information sharing security approach using reproduction data.  ... 
doi:10.5121/ijcsit.2011.3309 fatcat:a6lp2dknireetmbsmwwjc3cvjy

Towards Cognitive Cryptography

Lidia Ogiela, Marek R. Ogiela
2014 Journal of Internet Services and Information Security  
This new scientific area is marked by a new generation of information systems, focused on developing intelligent cryptographic protocols and procedures utilising cognitive information processing approaches  ...  Such systems are mainly designed to use the semantic analysis of encrypted data to select the most appropriate method of its encryption.  ...  Application Areas of Cognitive Cryptography In the light of the rapid development of cognitive information systems and the ability to use them for many diverse tasks of semantic data analysis, several  ... 
doi:10.22667/jisis.2014.02.31.058 dblp:journals/jisis/OgielaO14 fatcat:f6ocgve33jd5jhmgfadkqj6il4

Semantic Web Today: From Oil Rigs to Panama Papers [article]

Rivindu Perera, Parma Nand, Boris Bacic, Wen-Hsin Yang, Kazuhiro Seki,, Radek Burget
2017 arXiv   pre-print
The paper also offers a future outlook into Semantic Web applications and discusses the areas in which Semantic Web would play a key role in the future.  ...  The next leap on the internet has already started as Semantic Web. At its core, Semantic Web transforms the document oriented web to a data oriented web enriched with semantics embedded as metadata.  ...  However in recent times, there has also a steady trend towards the use of Semantic Web in business and commerce areas..  ... 
arXiv:1711.01518v1 fatcat:2zfblkjbo5enfkbzcbwwkquiue

Versioning and Evolution Requirements for Model-Based System Development

Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider
2014 Softwaretechnik-Trends  
Moreover, security is an increasingly important quality facet in modern information systems and needs to be retained properly.  ...  In model-based system development, this leads to a continuously changing information system model accordingly.  ...  While actual research in model-based security engineering [2] , [3] provides approaches for hardening and maintaining the security of evolving systems, these approaches require semantic evolution information  ... 
dblp:journals/stt/RuhrothGBJS14 fatcat:72qyb3azazfqtcdtcckva7yuem

Research and Application of Multi-Source Data Integration Based on Ontology

Hongyan Yun, Jianliang Xu, Craig A. Knoblock, Ruibo Xu
2016 International Journal of u- and e- Service, Science and Technology  
In this approach, constructed domain ontologies are used to describe data sources, and semantic integration for multisource data is realized by using an information integration toolkit named KARMA to map  ...  In view of existing structure heterogeneous and semantic heterogeneous, a multi-source data integration approach based on ontology is proposed.  ...  In this approach, ontology is used to describe data sources semantically, and semantic integration for multisource data is realized by using KARMA to map multiple datasets to RDF data.  ... 
doi:10.14257/ijunesst.2016.9.9.09 fatcat:kqiwlni6grfszfu7we7mqus7ta

SECURE SEMANTIC COMPUTING

KEVIN W. HAMLEN, BHAVANI THURAISINGHAM
2011 International Journal of Semantic Computing (IJSC)  
This paper explores the integration of semantic computing technologies with security technologies.  ...  programming language-based approaches to mobile code certification and data confidentiality enforcement are discussed.  ...  Our work has focused on three aspects of secure semantic computing technologies: First, we focus on secure semantic technologies for designing and developing intelligent web information management systems  ... 
doi:10.1142/s1793351x11001201 fatcat:5yddnb5kgngfnpy3urke6ulwai

A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study

Michael Lapke, Gurpreet Dhillon
2006 Americas Conference on Information Systems  
This study is aimed at understanding how multiple perspectives of stakeholders are incorporated in the formulation of security policy. The research was guided by the Theory of Semantics.  ...  The point of the case study was to provide insight into security policy formulation. This insight may guide researchers in developing principles for effective security policy design.  ...  Also, this study focused on the relatively small subset of those most directly involved in policy.  ... 
dblp:conf/amcis/LapkeD06 fatcat:uoadvjovczhj7ms62e4vj6rxbq

Ontological approach to big data analytics in cybersecurity domain

Anatoly Gladun, Katerina Khala, Ihor Subach
2020 Collection Information technology and security  
Big data Analytics is used for decision making in information security systems [1].  ...  In the work [4] it is proposed to use a thesaurus approach to formalize domain terminology.  ...  For this, you can use the pages of the category "Information security systems".  ... 
doi:10.20535/2411-1031.2020.8.2.222559 fatcat:wok3eonsnraijfh7wzcuecmbpe

Towards an Implementation of Information Flow Security Using Semantic Web Technologies

Oana Ureche, Robert Layton, Paul Watters
2012 2012 Third Cybercrime and Trustworthy Computing Workshop  
More information can be found at the Internet Commerce Security Laboratory website 1 .  ...  ACKNOWLEDGMENT This research was conducted at the Internet Commerce Security Laboratory and was funded by the State Government of Victoria, IBM, Westpac, the Australian Federal Police and the University  ...  Enforcing Security and Privacy Policies Using Semantic Web Reasoning In this section, an example of a framework [22] that uses Semantic Web reasoning for enforcing context-sensitive security and privacy  ... 
doi:10.1109/ctc.2012.12 fatcat:hlpmtajejjc4hg6p5bk6di5lty

Data and Applications Security: Past, Present and the Future [chapter]

Bhavani Thuraisingham
2004 IFIP International Federation for Information Processing  
Then it discuses some of the directions for data and applications security which includes secure semantic web, secure dependable information management, and secure sensor information management.  ...  This paper first describes the developments in data and applications security with a special emphasis on database security.  ...  INTRODUCTION Recent developments in information systems technologies have resulted in computerizing many applications in various business areas.  ... 
doi:10.1007/1-4020-8070-0_27 fatcat:243arxrbjbbs3pjcizf6ry7hg4

Semantic Technologies and Big Data Analytics for Cyber Defence

Louise Leenen, Thomas Meyer
2016 International Journal of Cyber Warfare and Terrorism  
An overview of the use of semantic technologies and big data technologies in cyber defence is provided, and important areas for future research in the combined domains are discussed.  ...  The incorporation of semantic information allows for increased understanding and sophistication in cyber defence systems.  ...  security information detected on one device or system in a centralised big data repository which then informs other devices and systems.  ... 
doi:10.4018/ijcwt.2016070105 fatcat:h5pa46gt3zcxrgcdq77qrklk74

Ontologies in Cloud Computing—Review and Future Directions

JohnBosco Agbaegbu, Oluwasefunmi Tale Arogundade, Sanjay Misra, Robertas Damaševičius
2021 Future Internet  
Ontologies use semantic analysis to define information within an environment with interconnecting relationships between heterogeneous sets.  ...  Ontologies are used to model knowledge. Once knowledge is modeled, knowledge management systems can be used to search, match, visualize knowledge, and also infer new knowledge.  ...  In [42] , the authors proposed an approach that could standardize security information and use this description with reasoners, to achieve new understanding and incorporate artifacts into a decision support  ... 
doi:10.3390/fi13120302 fatcat:jeutoki5dbch3dsuwm4irvs2de

An Overview of FORCES: An INRIA Project on Declarative Formalisms for Emergent Systems [chapter]

Jesús Aranda, Gerard Assayag, Carlos Olarte, Jorge A. Pérez, Camilo Rueda, Mauricio Toro, Frank D. Valencia
2009 Lecture Notes in Computer Science  
The FORCES project aims at providing robust and declarative formalisms for analyzing systems in the emerging areas of Security Protocols, Biological Systems and Multimedia Semantic Interaction.  ...  This way, our work has brought new semantic insights into the verification of security protocols, and is related to the research in security protocols from areas closely related to CCP.  ...  The semantics uses temporal constraints to finitely represent infinitely-many substitutions; it has been used to exhibit secrecy flaws in some security protocols [3] .  ... 
doi:10.1007/978-3-642-02846-5_44 fatcat:p5icbugmf5cilciphhqle7rhci

A review on automatic extraction and classification of non-functional requirements

Rahmat Ullah Khan, M. N. A. Khan
2017 International Journal of Advanced and Applied Sciences  
NFRs are often misunderstood and ignored due to which certain important aspect of the software such as robustness availability usability performance and security are compromised.  ...  Specifically we have identified the limitations of these techniques, their significance and the possible improvements that can be made to make these techniques more useful.  ...  Authors review different techniques used for specification of security and verification techniques use for security of modelbased systems and proposed different research areas on the basis of different  ... 
doi:10.21833/ijaas.2017.06.005 fatcat:g7xguri32nbifdgbnaznu7xeym
« Previous Showing results 1 — 15 out of 116,121 results