Sciweavers

2501 search results - page 364 / 501
» Logics with Rank Operators
Sort
View
FMCAD
2008
Springer
15 years 6 months ago
Mechanized Information Flow Analysis through Inductive Assertions
We present a method for verifying information flow properties of software programs using inductive assertions and theorem proving. Given a program annotated with information flow a...
Warren A. Hunt Jr., Robert Bellarmine Krug, Sandip...
DAGSTUHL
2007
15 years 6 months ago
Premise Independence in Judgment Aggregation
Judgment aggregation studies how agent opinions on logically interconnected propositions can be mapped into a collective judgment on the same propositions, and is plagued by impos...
Gabriella Pigozzi, Leendert van der Torre
DAGSTUHL
2007
15 years 6 months ago
Propositional Relevance through Letter-Sharing: Review and Contribution
The concept of relevance between classical propositional formulae, defined in terms of letter-sharing, has been around for a very long time. But it began to take on a fresh life i...
David Makinson
ICISC
2008
165views Cryptology» more  ICISC 2008»
15 years 6 months ago
Distributed Attribute-Based Encryption
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy, specified as a logical combination of attributes. Such ciphertexts can be decry...
Sascha Müller 0003, Stefan Katzenbeisser, Cla...
IFIP12
2008
15 years 6 months ago
A Risk Assessment System with Automatic Extraction of Event Types
In this article we describe the joint effort of experts in linguistics, information extraction and risk assessment to integrate EventSpotter, an automatic event extraction engine, ...
Philippe Capet, Thomas Delavallade, Takuya Nakamur...