The notion of belief has been useful in reasoning about authentication protocols. In this paper, we show how the notion of belief can be applied to reasoning about cache coherence...
Lily B. Mummert, Jeannette M. Wing, Mahadev Satyan...
Abstract. Privacy policies are often defined in terms of permitted messages. Instead, in this paper we derive dynamically the permitted messages from static privacy policies defi...
Guillaume Aucher, Guido Boella, Leendert van der T...
—Successful secure knowledge management requires consideration of both technical and organizational concerns. We use the example of existing industrial incident management system...
Software systems embed in them knowledge about the domain in which they operate. However, this knowledge is “latent”. Making such knowledge accessible could be of great value ...
A model is defined that predicts an agent's ascriptions of causality (and related notions of facilitation and justification) between two events in a chain, based on background...