找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Deontic Logic in Computer Science; 9th International Co Ron Meyden,Leendert Torre Conference proceedings 2008 Springer-Verlag Berlin Heidel

[复制链接]
楼主: 征募
发表于 2025-3-30 10:26:00 | 显示全部楼层
Prognostic Determinants in Lupus Nephritisome of the axioms come from modal logic and programming-language theory; others are suggested by ideas from security, such as delegation of authority and the Principle of Least Privilege. We compare these axioms and study their implications.
发表于 2025-3-30 13:37:37 | 显示全部楼层
https://doi.org/10.1007/978-94-007-2082-4e start out with some motivating examples concerning the interaction between action, obligation and knowledge. Then we present a complete temporal STIT logic including operators for action, obligation and knowledge. We use the logic to analyze the examples and discuss open problems.
发表于 2025-3-30 16:49:50 | 显示全部楼层
The Beneficial Effects of Regular Chewinghe framework to Standard Deontic logic (SDL) formulas. Given a deontic formula . ∈ ., our language contains formulas of the form . or ., where . ∈ [0, 1], expressing that the preference or probability degree respectively of a norm . is at least .. We present sound and complete axiomatisations for these logics.
发表于 2025-3-30 22:18:43 | 显示全部楼层
Norms in Branching Space-Times,eled in “branching time with agents and choices” (BTAC). The seriously ontological independence of agentive choices, however, requires, as a necessary condition, a causal order permitting space-like separation of those choices in a sense definable in “branching space-times with agents and choices” (
发表于 2025-3-31 01:25:10 | 显示全部楼层
发表于 2025-3-31 06:35:19 | 显示全部楼层
发表于 2025-3-31 11:05:20 | 显示全部楼层
Information Security Economics - and Beyond,onging to principals with divergent interests, incentives are becoming as important to dependability as technical design. The new field provides valuable insights not just into security topics such as privacy, bugs, spam, and phishing, but into more general areas such as system dependability (the de
发表于 2025-3-31 16:46:19 | 显示全部楼层
Trust and Norms in the Context of Computer Security: A Logical Formalization, general typology of trust is presented. We distinguish trust in the trustee’s action from trust in the trustee’s disposition (motivational or normative disposition); positive trust from negative trust. A part of the paper is devoted to the formalization of security properties and to the analysis of
发表于 2025-3-31 18:09:11 | 显示全部楼层
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic,formation flow control requirements and more recently on authentication and usage control requirements. Specifying administration and delegation policies is also an important issue, especially in the context of pervasive distributed systems. In this paper, we are investigating the new issue of model
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-4-29 20:03
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表