Sciweavers

1597 search results - page 20 / 320
» Mental Models of Computer Security
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 5 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
SAC
2004
ACM
15 years 7 months ago
Propositional planning in BDI agents
This paper aims to describe the relationship between propositional planning systems and the process of means-end reasoning used by BDI agents. To show such relationship, we defin...
Felipe Rech Meneguzzi, Avelino F. Zorzo, Michael d...
102
Voted
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 5 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
OOPSLA
2007
Springer
15 years 7 months ago
No ifs, ands, or buts: uncovering the simplicity of conditionals
Schematic tables are a new representation for conditionals. Roughly a cross between decision tables and data flow graphs, they represent computation and decision-making orthogona...
Jonathan Edwards
COGSCI
2007
138views more  COGSCI 2007»
15 years 1 months ago
The Brain Is Both Neurocomputer and Quantum Computer
In their article, Is the Brain a Quantum Computer,? Litt, Eliasmith, Kroon, Weinstein, and Thagard (2006) criticize the Penrose–Hameroff “Orch OR” quantum computational mode...
Stuart R. Hameroff