找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Deontic Logic in Computer Science; 9th International Co Ron Meyden,Leendert Torre Conference proceedings 2008 Springer-Verlag Berlin Heidel

[復制鏈接]
樓主: 征募
51#
發(fā)表于 2025-3-30 10:26:00 | 只看該作者
Prognostic Determinants in Lupus Nephritisome of the axioms come from modal logic and programming-language theory; others are suggested by ideas from security, such as delegation of authority and the Principle of Least Privilege. We compare these axioms and study their implications.
52#
發(fā)表于 2025-3-30 13:37:37 | 只看該作者
https://doi.org/10.1007/978-94-007-2082-4e start out with some motivating examples concerning the interaction between action, obligation and knowledge. Then we present a complete temporal STIT logic including operators for action, obligation and knowledge. We use the logic to analyze the examples and discuss open problems.
53#
發(fā)表于 2025-3-30 16:49:50 | 只看該作者
The Beneficial Effects of Regular Chewinghe framework to Standard Deontic logic (SDL) formulas. Given a deontic formula .?∈?., our language contains formulas of the form . or ., where .?∈?[0, 1], expressing that the preference or probability degree respectively of a norm . is at least .. We present sound and complete axiomatisations for these logics.
54#
發(fā)表于 2025-3-30 22:18:43 | 只看該作者
Norms in Branching Space-Times,eled in “branching time with agents and choices” (BTAC). The seriously ontological independence of agentive choices, however, requires, as a necessary condition, a causal order permitting space-like separation of those choices in a sense definable in “branching space-times with agents and choices” (
55#
發(fā)表于 2025-3-31 01:25:10 | 只看該作者
56#
發(fā)表于 2025-3-31 06:35:19 | 只看該作者
57#
發(fā)表于 2025-3-31 11:05:20 | 只看該作者
Information Security Economics - and Beyond,onging to principals with divergent interests, incentives are becoming as important to dependability as technical design. The new field provides valuable insights not just into security topics such as privacy, bugs, spam, and phishing, but into more general areas such as system dependability (the de
58#
發(fā)表于 2025-3-31 16:46:19 | 只看該作者
Trust and Norms in the Context of Computer Security: A Logical Formalization, general typology of trust is presented. We distinguish trust in the trustee’s action from trust in the trustee’s disposition (motivational or normative disposition); positive trust from negative trust. A part of the paper is devoted to the formalization of security properties and to the analysis of
59#
發(fā)表于 2025-3-31 18:09:11 | 只看該作者
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic,formation flow control requirements and more recently on authentication and usage control requirements. Specifying administration and delegation policies is also an important issue, especially in the context of pervasive distributed systems. In this paper, we are investigating the new issue of model
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 00:04
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
托克托县| 桑日县| 连平县| 德惠市| 科技| 哈密市| 金沙县| 大宁县| 子洲县| 福州市| 霍山县| 镇坪县| 沭阳县| 梁山县| 永宁县| 莱芜市| 都江堰市| 徐州市| 宜宾市| 盐池县| 永济市| 涟源市| 合水县| 康保县| 商城县| 珠海市| 石景山区| 广德县| 颍上县| 咸丰县| 铜梁县| 思南县| 渭源县| 山东| 三河市| 临西县| 江阴市| 东光县| 图片| 西藏| 思南县|