Sciweavers

460 search results - page 33 / 92
» On Role Logic
Sort
View
FASE
2008
Springer
13 years 9 months ago
A Logic of Graph Constraints
Abstract. Graph constraints were introduced in the area of graph transformation, in connection with the notion of (negative) application conditions, as a form to limit the applicab...
Fernando Orejas, Hartmut Ehrig, Ulrike Prange
EUSFLAT
2003
13 years 9 months ago
Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems
Emerging approaches to enforce some form of protection in (pseudo)anonymous peer to peer systems propose the use of reputations as a means to establish the reliability of servents...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
WISES
2003
13 years 9 months ago
Built-In Fault Injectors - The Logical Continuation of BIST?
— With the increasing number of embedded computer systems being used in safety critical applications the testing and assessment of a system’s fault tolerance properties become ...
Andreas Steininger, Babak Rahbaran, Thomas Handl
CORR
2011
Springer
140views Education» more  CORR 2011»
12 years 11 months ago
Bias-Driven Revision of Logical Domain Theories
The theory revision problem is the problem of how best to go about revising a deficient domain theory using information contained in examples that expose inaccuracies. In this pa...
Ronen Feldman, Moshe Koppel, Alberto Maria Segre
CADE
2011
Springer
12 years 7 months ago
ASASP: Automated Symbolic Analysis of Security Policies
We describe asasp, a symbolic reachability procedure for the analysis of administrative access control policies. The tool represents access policies and their administrative action...
Francesco Alberti, Alessandro Armando, Silvio Rani...