-
1
-
-
85033566750
-
Logic programming for large scale applications in law: A formalisation of supplementary benefit legislation
-
ACM Press
-
T. J. M. Bench-Capon, G. O. Robinson, T. W. Routen, and M. J. Sergot. Logic programming for large scale applications in law: A formalisation of supplementary benefit legislation. In Proc. of ICAIL'87, pages 190-198. ACM Press, 1987.
-
(1987)
Proc. of ICAIL'87
, pp. 190-198
-
-
Bench-Capon, T.J.M.1
Robinson, G.O.2
Routen, T.W.3
Sergot, M.J.4
-
2
-
-
0142166366
-
A model of legal reasoning with cases incorporating theories and values
-
T. J. M. Bench-Capon and G. Sartor. A model of legal reasoning with cases incorporating theories and values. Artif Intell., 150(1-2):97-143, 2003.
-
(2003)
Artif Intell
, vol.150
, Issue.1-2
, pp. 97-143
-
-
Bench-Capon, T.J.M.1
Sartor, G.2
-
3
-
-
34548039861
-
-
K. D.M. and E. M.C. Final technical report: Security patterns for web application development. Technical report, 2002. Available at http://www.scrypt.net/
-
K. D.M. and E. M.C. Final technical report: Security patterns for web application development. Technical report, 2002. Available at http://www.scrypt.net/
-
-
-
-
4
-
-
34548046354
-
-
E. Fernandez and R. Pan. A Pattern Language for Security Models. In In Proc. of PLoP'01, 2001.
-
E. Fernandez and R. Pan. A Pattern Language for Security Models. In In Proc. of PLoP'01, 2001.
-
-
-
-
6
-
-
84924413055
-
Security and Trust Requirements Engineering
-
FOSAD 2004/, Springer-Verlag
-
P. Giorgini, F. Massacci, and N. Zannone. Security and Trust Requirements Engineering. In FOSAD 2004/2005, LNCS 3655, pages 237-272. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3655
, pp. 237-272
-
-
Giorgini, P.1
Massacci, F.2
Zannone, N.3
-
8
-
-
84979103541
-
Law and logic
-
S. Kanger. Law and logic. Theoria, 38(3):105-132, 1972.
-
(1972)
Theoria
, vol.38
, Issue.3
, pp. 105-132
-
-
Kanger, S.1
-
10
-
-
34548030099
-
Computer Representation of the Law
-
Morgan Kaufmann
-
R. A. Kowalski and M. J. Sergot. Computer Representation of the Law. In Proc. of IJCAI'05, pages 1269-1270. Morgan Kaufmann, 1985.
-
(1985)
Proc. of IJCAI'05
, pp. 1269-1270
-
-
Kowalski, R.A.1
Sergot, M.J.2
-
11
-
-
0542386004
-
How to write a long formula
-
L. Lamport. How to write a long formula. Formal Aspects of Comp., 6(5):580-584, 1994.
-
(1994)
Formal Aspects of Comp
, vol.6
, Issue.5
, pp. 580-584
-
-
Lamport, L.1
-
13
-
-
34548014416
-
-
H. Mouratidis, M. Weiss, and P. Giorgini. Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems. In In Proc. of ER'05, 2005.
-
H. Mouratidis, M. Weiss, and P. Giorgini. Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems. In In Proc. of ER'05, 2005.
-
-
-
-
15
-
-
34548047575
-
-
J. Yoder and J. Barcalow. Architectural Patterns for Enabling Application Security. In In Proc. of PLoP'97, 1997.
-
J. Yoder and J. Barcalow. Architectural Patterns for Enabling Application Security. In In Proc. of PLoP'97, 1997.
-
-
-
|