找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Deontic Logic in Computer Science; 9th International Co Ron Meyden,Leendert Torre Conference proceedings 2008 Springer-Verlag Berlin Heidel

[復(fù)制鏈接]
樓主: 征募
51#
發(fā)表于 2025-3-30 10:26:00 | 只看該作者
Prognostic Determinants in Lupus Nephritisome of the axioms come from modal logic and programming-language theory; others are suggested by ideas from security, such as delegation of authority and the Principle of Least Privilege. We compare these axioms and study their implications.
52#
發(fā)表于 2025-3-30 13:37:37 | 只看該作者
https://doi.org/10.1007/978-94-007-2082-4e start out with some motivating examples concerning the interaction between action, obligation and knowledge. Then we present a complete temporal STIT logic including operators for action, obligation and knowledge. We use the logic to analyze the examples and discuss open problems.
53#
發(fā)表于 2025-3-30 16:49:50 | 只看該作者
The Beneficial Effects of Regular Chewinghe framework to Standard Deontic logic (SDL) formulas. Given a deontic formula .?∈?., our language contains formulas of the form . or ., where .?∈?[0, 1], expressing that the preference or probability degree respectively of a norm . is at least .. We present sound and complete axiomatisations for these logics.
54#
發(fā)表于 2025-3-30 22:18:43 | 只看該作者
Norms in Branching Space-Times,eled in “branching time with agents and choices” (BTAC). The seriously ontological independence of agentive choices, however, requires, as a necessary condition, a causal order permitting space-like separation of those choices in a sense definable in “branching space-times with agents and choices” (
55#
發(fā)表于 2025-3-31 01:25:10 | 只看該作者
56#
發(fā)表于 2025-3-31 06:35:19 | 只看該作者
57#
發(fā)表于 2025-3-31 11:05:20 | 只看該作者
Information Security Economics - and Beyond,onging to principals with divergent interests, incentives are becoming as important to dependability as technical design. The new field provides valuable insights not just into security topics such as privacy, bugs, spam, and phishing, but into more general areas such as system dependability (the de
58#
發(fā)表于 2025-3-31 16:46:19 | 只看該作者
Trust and Norms in the Context of Computer Security: A Logical Formalization, general typology of trust is presented. We distinguish trust in the trustee’s action from trust in the trustee’s disposition (motivational or normative disposition); positive trust from negative trust. A part of the paper is devoted to the formalization of security properties and to the analysis of
59#
發(fā)表于 2025-3-31 18:09:11 | 只看該作者
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic,formation flow control requirements and more recently on authentication and usage control requirements. Specifying administration and delegation policies is also an important issue, especially in the context of pervasive distributed systems. In this paper, we are investigating the new issue of model
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-6 22:16
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
芜湖县| 绥棱县| 广南县| 秀山| 手机| 嘉峪关市| 永川市| 瑞安市| 鲁山县| 苏尼特右旗| 江门市| 普陀区| 洪湖市| 白朗县| 亚东县| 新平| 金昌市| 嘉峪关市| 汉寿县| 长汀县| 泽州县| 海阳市| 武乡县| 广元市| 交城县| 永川市| 漾濞| 政和县| 乌什县| 新巴尔虎左旗| 娱乐| 化德县| 上虞市| 大英县| 光泽县| 黔南| 宣恩县| 通化县| 曲靖市| 镇江市| 庄浪县|