抛媚眼 发表于 2025-3-30 10:26:00
Prognostic Determinants in Lupus Nephritisome of the axioms come from modal logic and programming-language theory; others are suggested by ideas from security, such as delegation of authority and the Principle of Least Privilege. We compare these axioms and study their implications.babble 发表于 2025-3-30 13:37:37
https://doi.org/10.1007/978-94-007-2082-4e start out with some motivating examples concerning the interaction between action, obligation and knowledge. Then we present a complete temporal STIT logic including operators for action, obligation and knowledge. We use the logic to analyze the examples and discuss open problems.gorgeous 发表于 2025-3-30 16:49:50
The Beneficial Effects of Regular Chewinghe framework to Standard Deontic logic (SDL) formulas. Given a deontic formula . ∈ ., our language contains formulas of the form . or ., where . ∈ , expressing that the preference or probability degree respectively of a norm . is at least .. We present sound and complete axiomatisations for these logics.DEMUR 发表于 2025-3-30 22:18:43
Norms in Branching Space-Times,eled in “branching time with agents and choices” (BTAC). The seriously ontological independence of agentive choices, however, requires, as a necessary condition, a causal order permitting space-like separation of those choices in a sense definable in “branching space-times with agents and choices” (非秘密 发表于 2025-3-31 01:25:10
http://reply.papertrans.cn/27/2657/265680/265680_55.pngenterprise 发表于 2025-3-31 06:35:19
http://reply.papertrans.cn/27/2657/265680/265680_56.pngConspiracy 发表于 2025-3-31 11:05:20
Information Security Economics - and Beyond,onging to principals with divergent interests, incentives are becoming as important to dependability as technical design. The new field provides valuable insights not just into security topics such as privacy, bugs, spam, and phishing, but into more general areas such as system dependability (the de冲击力 发表于 2025-3-31 16:46:19
Trust and Norms in the Context of Computer Security: A Logical Formalization, general typology of trust is presented. We distinguish trust in the trustee’s action from trust in the trustee’s disposition (motivational or normative disposition); positive trust from negative trust. A part of the paper is devoted to the formalization of security properties and to the analysis ofSEMI 发表于 2025-3-31 18:09:11
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic,formation flow control requirements and more recently on authentication and usage control requirements. Specifying administration and delegation policies is also an important issue, especially in the context of pervasive distributed systems. In this paper, we are investigating the new issue of model