Learn More
We present the structure of an ontology for Information Security (IS) and discuss a paradigm whereby it can be used to extract knowledge from natural language texts such as IS standards, security policies and security control descriptions. Besides providing a vocabulary for the IS domain, the proposed ontology stores logical forms corresponding to(More)
We present the structure of an ontology for Information Security (IS), applied to the extraction of knowledge from Natural Language texts (IS standards, security policies and security control descriptions). This ontology is composed of the vocabulary for the IS Domain, and a particular kind of ontology description, logical forms to determine the structure(More)
— This paper presents a high-level specification language (LEP) for designing protocols and distributed algorithms. Its high-level feature is due mainly to pronouns, which are an abstract and homogeneous way of accessing distinct nodes over a network. A couple of examples are given in order to illustrate LEP's use. Since many different topologies may be(More)
The main motivation of this paper is to describe an architecture that intends to ease the verification of distributed algorithms and protocols (possibly mobile) through model checking. The core of the architecture is the protocol specification language (LEP), which has constructions, called pronouns, that allows for high-level specification. This means a(More)
The Web of Data is a global data space based on open standards. However, it is still far from reality found in websites: unstructured and disconnected data focused on human understanding. This work aims to mitigate this problem for a portion of data in the health area, data about medical doctors and health facilities. Thus, this paper presents an(More)
  • 1