找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Deontic Logic in Computer Science; 9th International Co Ron Meyden,Leendert Torre Conference proceedings 2008 Springer-Verlag Berlin Heidel

[復制鏈接]
樓主: 征募
51#
發(fā)表于 2025-3-30 10:26:00 | 只看該作者
Prognostic Determinants in Lupus Nephritisome of the axioms come from modal logic and programming-language theory; others are suggested by ideas from security, such as delegation of authority and the Principle of Least Privilege. We compare these axioms and study their implications.
52#
發(fā)表于 2025-3-30 13:37:37 | 只看該作者
https://doi.org/10.1007/978-94-007-2082-4e start out with some motivating examples concerning the interaction between action, obligation and knowledge. Then we present a complete temporal STIT logic including operators for action, obligation and knowledge. We use the logic to analyze the examples and discuss open problems.
53#
發(fā)表于 2025-3-30 16:49:50 | 只看該作者
The Beneficial Effects of Regular Chewinghe framework to Standard Deontic logic (SDL) formulas. Given a deontic formula .?∈?., our language contains formulas of the form . or ., where .?∈?[0, 1], expressing that the preference or probability degree respectively of a norm . is at least .. We present sound and complete axiomatisations for these logics.
54#
發(fā)表于 2025-3-30 22:18:43 | 只看該作者
Norms in Branching Space-Times,eled in “branching time with agents and choices” (BTAC). The seriously ontological independence of agentive choices, however, requires, as a necessary condition, a causal order permitting space-like separation of those choices in a sense definable in “branching space-times with agents and choices” (
55#
發(fā)表于 2025-3-31 01:25:10 | 只看該作者
56#
發(fā)表于 2025-3-31 06:35:19 | 只看該作者
57#
發(fā)表于 2025-3-31 11:05:20 | 只看該作者
Information Security Economics - and Beyond,onging to principals with divergent interests, incentives are becoming as important to dependability as technical design. The new field provides valuable insights not just into security topics such as privacy, bugs, spam, and phishing, but into more general areas such as system dependability (the de
58#
發(fā)表于 2025-3-31 16:46:19 | 只看該作者
Trust and Norms in the Context of Computer Security: A Logical Formalization, general typology of trust is presented. We distinguish trust in the trustee’s action from trust in the trustee’s disposition (motivational or normative disposition); positive trust from negative trust. A part of the paper is devoted to the formalization of security properties and to the analysis of
59#
發(fā)表于 2025-3-31 18:09:11 | 只看該作者
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic,formation flow control requirements and more recently on authentication and usage control requirements. Specifying administration and delegation policies is also an important issue, especially in the context of pervasive distributed systems. In this paper, we are investigating the new issue of model
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 00:04
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
社旗县| 镇巴县| 海南省| 永川市| 河源市| 达拉特旗| 收藏| 海门市| 南宁市| 通榆县| 元阳县| 徐水县| 定州市| 南皮县| 晴隆县| 昭觉县| 东方市| 大连市| 福泉市| 万州区| 福清市| 玉树县| 沙湾县| 湖口县| 宁武县| 墨竹工卡县| 广元市| 申扎县| 普格县| 灵寿县| 永济市| 五莲县| 定兴县| 尉犁县| 封丘县| 从化市| 当涂县| 大英县| 弥勒县| 达拉特旗| 会泽县|