The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Deontic logic is appropriate to model a wide variety of legal arguments, however this logic suffers form certain paradoxes of which the so-called Chisholm is one of the most notor...
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal l...
Abstract. In human-like reasoning it often happens that different conditions, partially alternative and hierarchically structured, are mentally grouped in order to derive some conc...
Francesco Buccafurri, Gianluca Caminiti, Domenico ...
Abstract. We show how a program analysis technique originally developed for C-like pointer structures can be adapted to analyse the hierarchical structure of processes in the ambie...