Sciweavers

227 search results - page 25 / 46
» A Spatial-Epistemic Logic for Reasoning about Security Proto...
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
14 years 1 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
ADHOCNOW
2008
Springer
15 years 4 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
PPDP
2010
Springer
14 years 7 months ago
Tabling for transaction logic
Transaction Logic is a logic for representing declarative and procedural knowledge in logic programming, databases, and AI. It has been successful in areas as diverse as workflows...
Paul Fodor, Michael Kifer
AGENTS
2001
Springer
15 years 2 months ago
PHOSPHORUS: a task-based agent matchmaker
PHOSPHORUS is an agent matchmaking service that exploits domain ontologies, description logic, and a highly declarative language to reason about task-related agent capabilities. P...
Yolanda Gil, Surya Ramachandran
ESORICS
2007
Springer
15 years 4 months ago
Adaptive Soundness of Static Equivalence
Abstract. We define a framework to reason about implementations of equational theories in the presence of an adaptive adversary. We particularly focus on soundess of static equiva...
Steve Kremer, Laurent Mazaré