Learn More
Participants IS Consulting Firm ⇒ Experienced at developing and implementing tools and techniques for Information Security and Risk Analysis. Strong presence in the marketplace. Standards Public documents in normative text Set of Control Objectives to be accomplished by the organization desiring a higher level of security State what should be achieved at a(More)
We present the structure of an ontology for Information Security (IS), applied to the extraction of knowledge from Natural Language texts (IS standards, security policies and security control descriptions). This ontology is composed of the vocabulary for the IS Domain, and a particular kind of ontology description, logical forms to determine the structure(More)
The Web of Data is a global data space based on open standards. However, it is still far from reality found in websites: unstructured and disconnected data focused on human understanding. This work aims to mitigate this problem for a portion of data in the health area, data about medical doctors and health facilities. Thus, this paper presents an(More)
The main motivation of this paper is to describe an architecture that intends to ease the verification of distributed algorithms and protocols (possibly mobile) through model checking. The core of the architecture is the protocol specification language (LEP), which has constructions, called pronouns, that allows for high-level specification. This means a(More)
— This paper presents a high-level specification language (LEP) for designing protocols and distributed algorithms. Its high-level feature is due mainly to pronouns, which are an abstract and homogeneous way of accessing distinct nodes over a network. A couple of examples are given in order to illustrate LEP's use. Since many different topologies may be(More)
  • 1