메뉴 건너뛰기




Volumn 3775 LNCS, Issue , 2005, Pages 97-108

An approach to understanding policy based on autonomy and voluntary cooperation

Author keywords

[No Author keywords available]

Indexed keywords

AUTONOMOUS AGENTS; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION MANAGEMENT; MATHEMATICAL MODELS; PARALLEL PROCESSING SYSTEMS; PROBLEM SOLVING; PUBLIC POLICY; COMPUTERS;

EID: 33646735764     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11568285_9     Document Type: Conference Paper
Times cited : (35)

References (29)
  • 7
  • 9
    • 2442625568 scopus 로고    scopus 로고
    • Cfengine's immunity model of evolving configuration management
    • M. Burgess. Cfengine's immunity model of evolving configuration management. Science of Computer Programming, 51:197, 2004.
    • (2004) Science of Computer Programming , vol.51 , pp. 197
    • Burgess, M.1
  • 10
    • 0029311990 scopus 로고
    • A site configuration engine
    • MIT Press; Cambridge MA
    • M. Burgess, A site configuration engine. Computing systems (MIT Press; Cambridge MA), 8:309, 1995.
    • (1995) Computing Systems , vol.8 , pp. 309
    • Burgess, M.1
  • 14
    • 0019548112 scopus 로고
    • Formal models of capability-based protection systems
    • L. Snyder. Formal models of capability-based protection systems. IEEE Transactions on Computers, 30:172, 1981.
    • (1981) IEEE Transactions on Computers , vol.30 , pp. 172
    • Snyder, L.1
  • 17
    • 4444346465 scopus 로고    scopus 로고
    • A natural definition of clusters and roles in undirected graphs
    • G. Canright and K. Engø-Monsen. A natural definition of clusters and roles in undirected graphs. Science of Computer Programming, 53:195, 2004.
    • (2004) Science of Computer Programming , vol.53 , pp. 195
    • Canright, G.1    Engø-Monsen, K.2
  • 18
    • 30344459012 scopus 로고    scopus 로고
    • A graph theoretical model of computer security: From file access to social engineering
    • M. Burgess, G. Canright, and K. Engø. A graph theoretical model of computer security: from file access to social engineering. International Journal of Information Security, 3:70-85, 2004.
    • (2004) International Journal of Information Security , vol.3 , pp. 70-85
    • Burgess, M.1    Canright, G.2    Engø, K.3
  • 19
    • 33646744104 scopus 로고    scopus 로고
    • A flexible method for information system security policy specifications
    • R. Ortalo. A flexible method for information system security policy specifications, Lecture Notes on Computer Science, 1485:67-85, 1998.
    • (1998) Lecture Notes on Computer Science , vol.1485 , pp. 67-85
    • Ortalo, R.1
  • 23
    • 0007827010 scopus 로고    scopus 로고
    • Dyadic: Deontic logic and contrary-to-duty obligations
    • Defeasible Deontic logic: Essays in Nonmonotonic Normative Reasoning. Kluwer Academic Publisher
    • H. Prakken and M. Sergot. Dyadic: deontic logic and contrary-to-duty obligations. In Defeasible Deontic logic: Essays in Nonmonotonic Normative Reasoning, volume 263 of Synthese library. Kluwer Academic Publisher, 1997.
    • (1997) Synthese Library , vol.263
    • Prakken, H.1    Sergot, M.2
  • 24
    • 0001972488 scopus 로고
    • Semantical considerations in modal logic
    • S.A. Kripke. Semantical considerations in modal logic. Acta Philosophica Fenica, 16:83-94, 1963.
    • (1963) Acta Philosophica Fenica , vol.16 , pp. 83-94
    • Kripke, S.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.