-
2
-
-
0026385742
-
TABLEAUX: A General Theorem Prover for Modal Logics
-
L. Catach, “TABLEAUX: A General Theorem Prover for Modal Logics”, Journal of Automated Reasoning, vol. 7, pp. 489-510, 1991.
-
(1991)
Journal of Automated Reasoning
, vol.7
, pp. 489-510
-
-
Catach, L.1
-
3
-
-
84939878527
-
-
ISBN 0-521-29515-7, Cambridge University Press
-
B.F. Chellas, Modal Logic: An Introduction, 295 p., ISBN 0-521-29515-7, Cambridge University Press, 1980.
-
(1980)
An Introduction
-
-
Chellas, B.F.1
Logic, M.2
-
4
-
-
0030705406
-
Analyzing Consistency of Security Policies
-
Oakland, California, May 4-7, ISBN 0-8186-7828-3, IEEE Computer Society Press
-
L. Cholvy, F. Cuppens, “Analyzing Consistency of Security Policies”, in IEEE Symposium on Security and Privacy, Oakland, California, May 4-7, pp. 103-112, ISBN 0-8186-7828-3, IEEE Computer Society Press, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 103-112
-
-
Cholvy, L.1
Cuppens, F.2
-
5
-
-
0029714452
-
Specifying a Security Policy: A Case Study
-
Kenmare, Ireland, June 10-12, ISBN 0-8186-7522-5, IEEE Computer Society Press
-
F. Cuppens, C. Sanrel, “Specifying a Security Policy: A Case Study”, in 9th IEEE Computer Security Foundations Workshop, Kenmare, Ireland, June 10-12, pp. 123-134, ISBN 0-8186-7522-5, IEEE Computer Society Press, 1996.
-
(1996)
9Th IEEE Computer Security Foundations Workshop
, pp. 123-134
-
-
Cuppens, F.1
Sanrel, C.2
-
6
-
-
0007895761
-
Modal Deduction with Applications in Epistemic and Temporal Logic
-
(D. M. Gabbay, C.J. Hogger, J.A. Robinson, Eds.), ISBN 0-19-853791-3, Oxford Science Publications
-
L. Farifias del Cerro, A. Herzig, “Modal Deduction with Applications in Epistemic and Temporal Logic”, in Handbook of Logic in Artificial Intelligence and Logic Programming, Epistemic and Temporal Reasoning (D. M. Gabbay, C.J. Hogger, J.A. Robinson, Eds.), vol. 4/5, pp. 499-594, ISBN 0-19-853791-3, Oxford Science Publications, 1995.
-
(1995)
Handbook of Logic in Artificial Intelligence and Logic Programming, Epistemic and Temporal Reasoning
, vol.4
, Issue.5
, pp. 499-594
-
-
Farifias Del Cerro, L.1
Herzig, A.2
-
7
-
-
0001063429
-
First-Order Modal Tableaux
-
M. Fitting, “First-Order Modal Tableaux”, Journal of Automated Reasoning, vol. 4, no. 2, pp. 191-213, 1988.
-
(1988)
Journal of Automated Reasoning
, vol.4
, Issue.2
, pp. 191-213
-
-
Fitting, M.1
-
8
-
-
0001604343
-
Basic Modal Logic
-
(D. M. Gabbay, C.J. Hogger, J.A. Robinson, Eds.), ISBN 0-19-853745-X, Oxford Science Publications
-
M. Fitting, “Basic Modal Logic”, in Handbook of Logic in Artificial Intelligence and Logic Programming, Logical Foundations (D. M. Gabbay, C.J. Hogger, J.A. Robinson, Eds.), vol. 1/5, pp. 365-448, ISBN 0-19-853745-X, Oxford Science Publications, 1993.
-
(1993)
Handbook of Logic in Artificial Intelligence and Logic Programming, Logical Foundations
, vol.1
, Issue.5
, pp. 365-448
-
-
Fitting, M.1
-
9
-
-
0025694649
-
-
Franconia, IEEE Computer Society Press
-
J. Glasgow, G. McEwen, P. Panangaden, “A Logic for Reasoning About Security”, in Computer Security Foundations Workshop, Franconia, pp. 2-13, IEEE Computer Society Press, 1990.
-
(1990)
A Logic for Reasoning about Security
, pp. 2-13
-
-
Glasgow, J.1
McEwen, G.2
Panangaden, P.3
-
10
-
-
84958806035
-
-
ISBN 92-826-3004-8, Office for Official Publications of the European Communities, Luxembourg
-
ITSEC, Information Technology Security Evaluation Criteria, vl.2, 163p., ISBN 92-826-3004-8, Office for Official Publications of the European Communities, Luxembourg, 1991.
-
(1991)
, vol.2
-
-
-
11
-
-
2642575075
-
-
ISBN 92-826-7087-2, Office for Official Publications of the European Communities, Luxembourg
-
ITSEM, Information Technology Security Evaluation Manual, vl.0, 262p., ISBN 92-826-7087-2, Office for Official Publications of the European Communities, Luxembourg, 1993.
-
(1993)
Information Technology Security Evaluation Manual
, vol.1
-
-
-
12
-
-
84942856222
-
Formal Specification of Security Requirements using the Theory of Normative Positions
-
(Y. Deswarte, G. Eizenberg, J.-J. Quisquater, Eds.), Toulouse, France, November 23-25, LNCS, ISBN 3-540-56246-X & 0-387-56246-X, Springer-Verlag
-
A.J.I. Jones, M. Sergot, “Formal Specification of Security Requirements using the Theory of Normative Positions”, in Second European Symposium On Research In Computer Security (ESORICS 92), (Y. Deswarte, G. Eizenberg, J.-J. Quisquater, Eds.), Toulouse, France, November 23-25, LNCS, 648, pp. 103-121, ISBN 3-540-56246-X & 0-387-56246-X, Springer-Verlag, 1992.
-
(1992)
Second European Symposium on Research in Computer Security (ESORICS 92)
, vol.648
, pp. 103-121
-
-
Jones, A.J.I.1
Sergot, M.2
-
13
-
-
0001972488
-
Semantical Considerations in Modal Logic
-
S.A. Kripke, “Semantical Considerations in Modal Logic”, Acta Philosophica Fennica, vol. 16, pp. 83-94, 1963.
-
(1963)
Acta Philosophica Fennica
, vol.16
, pp. 83-94
-
-
Kripke, S.A.1
-
14
-
-
0023566001
-
-
6th ACM Conference on Principles of Database Systems (PODS), San Diego, California, USA, March 23-25, ISBN 0-89791-223-3, ACM Press
-
G. Kuper, “Logic Programming with Sets”, in 6th ACM Conference on Principles of Database Systems (PODS), San Diego, California, USA, March 23-25, pp. 11-20, ISBN 0-89791-223-3, ACM Press, 1987.
-
(1987)
Logic Programming with Sets
, pp. 11-20
-
-
Kuper, G.1
-
15
-
-
0003854517
-
-
(Eds.), ISBN 0-471-93743-6, Jon Wiley & Sons
-
J.-J. C. Meyer, R.J. Wieringa (Eds.), Deontic Logic in Computer Science, 317p., ISBN 0-471-93743-6, Jon Wiley & Sons, 1993.
-
(1993)
Deontic Logic in Computer Science
-
-
Meyer, J.-J.C.1
Wieringa, R.J.2
-
16
-
-
0031165668
-
The Amulet Environment: New Models for Effective User Interface Software Development
-
B.A. Myers, R. G. McDaniel, R. C. Miller, A. S. Ferrency, A. Faulring, B. D. Kyle, A. Mickish, A. Klimovitski, P. Doane, “The Amulet Environment: New Models for Effective User Interface Software Development”, IEEE Transations on Software Engineering, vol. 23 no. 6, pp. 347-365, June, 1997.
-
(1997)
IEEE Transations on Software Engineering
, vol.23
, Issue.6
, pp. 347-365
-
-
Myers, B.A.1
McDaniel, R.G.2
Miller, R.C.3
Ferrency, A.S.4
Faulring, A.5
Kyle, B.D.6
Mickish, A.7
Klimovitski, A.8
Doane, P.9
-
18
-
-
84958806036
-
-
14th IFIP International Information Security Conference (IFIP/SEC’ 98), August 31-September 4, Vienna-Budapest, Austria-Hungary, Chapman & Hall, (to appear)
-
R. Ortalo, Y. Deswarte, “Quantitative Evaluation of Information System Security”, in 14th IFIP International Information Security Conference (IFIP/SEC’ 98), August 31-September 4, Vienna-Budapest, Austria-Hungary, Chapman & Hall, 1998. (to appear)
-
(1998)
Quantitative Evaluation of Information System Security
-
-
Ortalo, R.1
Deswarte, Y.2
-
19
-
-
0030086382
-
Role-Based Access Control Models
-
February
-
R.S. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman, “Role-Based Access Control Models”, IEEE Computer, vol. 29, no. 2, pp. 38-47, February, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|