As the part I of the presentation, we introduce concept of the lattice, the technology called formal concept analysis (FCA) and show their relation with the system security models. FCA is an application of the lattice theory and has been proposed as a method for the knowledge analysis. The basis of FCA is the Galois connection in the lattice theory, which derives a lattice from a context table. In the system security area, the lattice theory also plays important roles. One of the classical facts is that any secure information flow systems from lattices. It was explained in an axiomatic argument on property of secure information flow. In this presentation, we show this classical result by applying FCA to an access control table derived from ...
for the defense sector, lattice-based access controls can be used in most circumstances where inform...
This paper serves to bring three independent but important areas of computer science to a common mee...
AbstractThis paper serves to bring three independent but important areas of computer science to a co...
This paper investigates mechanisms that guarantee secure information flow in a computer system. Thes...
International audienceIn this chapter, we introduce Formal Concept Analysis (FCA) and some of its ex...
Since the 1980s, the concept lattice was studied and applied to the problems of text mining, frequen...
Security design patterns are proven solutions to recurring security problems. They are classified in...
We demonstrate how one can use the formal concept analysis (FCA) to obtain the role hierarchy for th...
Managing knowledge is a difficult and slippery enterprise. A wide variety of technologies have to be...
When a computer program requires legitimate access to confidential data, the question arises whether...
International audienceOne of the first models to be proposed as a document index for retrieval purpo...
International audienceFormal Concept Analysis (FCA) is a multi-disciplinary field built on the solid...
International audienceKnowledge discovery in large and complex datasets is one main topic addressed ...
Formal concept analysis has grown from a new branch of the mathematical field of lattice theory to a...
Formal Concept Analysis (FCA) is an effective tool for data analysis and knowledge discovery. Concep...
for the defense sector, lattice-based access controls can be used in most circumstances where inform...
This paper serves to bring three independent but important areas of computer science to a common mee...
AbstractThis paper serves to bring three independent but important areas of computer science to a co...
This paper investigates mechanisms that guarantee secure information flow in a computer system. Thes...
International audienceIn this chapter, we introduce Formal Concept Analysis (FCA) and some of its ex...
Since the 1980s, the concept lattice was studied and applied to the problems of text mining, frequen...
Security design patterns are proven solutions to recurring security problems. They are classified in...
We demonstrate how one can use the formal concept analysis (FCA) to obtain the role hierarchy for th...
Managing knowledge is a difficult and slippery enterprise. A wide variety of technologies have to be...
When a computer program requires legitimate access to confidential data, the question arises whether...
International audienceOne of the first models to be proposed as a document index for retrieval purpo...
International audienceFormal Concept Analysis (FCA) is a multi-disciplinary field built on the solid...
International audienceKnowledge discovery in large and complex datasets is one main topic addressed ...
Formal concept analysis has grown from a new branch of the mathematical field of lattice theory to a...
Formal Concept Analysis (FCA) is an effective tool for data analysis and knowledge discovery. Concep...
for the defense sector, lattice-based access controls can be used in most circumstances where inform...
This paper serves to bring three independent but important areas of computer science to a common mee...
AbstractThis paper serves to bring three independent but important areas of computer science to a co...