-
1
-
-
0004216472
-
-
Upper Saddle River, NJ, USA: Prentice-Hall, Inc
-
C. Kaufman, R. Perlman, and M. Speciner, Network security: private communication in a public world. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1995.
-
(1995)
Network Security: Private Communication in A Public World
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
2
-
-
70450230145
-
Three voting protocols: Threeballot, vav, and twin
-
ser. EVT'07. Berkeley, CA, USA: USENIX Association
-
R. L. Rivest and W. D. Smith, "Three voting protocols: Threeballot, vav, and twin," in Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology, ser. EVT'07. Berkeley, CA, USA: USENIX Association, 2007, pp. 16-16.
-
(2007)
Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
, pp. 16
-
-
Rivest, R.L.1
Smith, W.D.2
-
3
-
-
52049124778
-
Practical secrecy-preserving, verifiably correct and trustworthy auctions
-
Nov.
-
D. C. Parkes, M. O. Rabin, S. M. Shieber, and C. Thorpe, "Practical secrecy-preserving, verifiably correct and trustworthy auctions," Electron. Commer. Rec. Appl., vol. 7, no. 3, pp. 294-312, Nov. 2008.
-
(2008)
Electron. Commer. Rec. Appl.
, vol.7
, Issue.3
, pp. 294-312
-
-
Parkes, D.C.1
Rabin, M.O.2
Shieber, S.M.3
Thorpe, C.4
-
4
-
-
0023545076
-
How to play any mental game
-
ser. STOC '87. New York, NY, USA: ACM
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game," in Proceedings of the nineteenth annual ACM symposium on Theory of computing, ser. STOC '87. New York, NY, USA: ACM, 1987, pp. 218-229.
-
(1987)
Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
5
-
-
0005095809
-
Accountability in a computerized society
-
H. Nissenbaum, "Accountability in a computerized society," Science and Engineering Ethics, vol. 2, no. 1, pp. 25-42, 1996.
-
(1996)
Science and Engineering Ethics
, vol.2
, Issue.1
, pp. 25-42
-
-
Nissenbaum, H.1
-
6
-
-
17544394392
-
Computer security in the real world
-
june
-
B. Lampson, "Computer security in the real world," Computer, vol. 37, no. 6, pp. 37-46, june 2004.
-
(2004)
Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.1
-
7
-
-
33750447642
-
Compositional analysis of contract-signing protocols
-
M. Backes, A. Datta, A. Derek, J. C. Mitchell, and M. Turuani, "Compositional analysis of contract-signing protocols," Theor. Comput. Sci., vol. 367, no. 1-2, pp. 33-56, 2006.
-
(2006)
Theor. Comput. Sci.
, vol.367
, Issue.1-2
, pp. 33-56
-
-
Backes, M.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
Turuani, M.5
-
8
-
-
41149164678
-
Peerreview: Practical accountability for distributed systems
-
A. Haeberlen, P. Kouznetsov, and P. Druschel, "Peerreview: practical accountability for distributed systems," in SOSP, 2007, pp. 175-188.
-
(2007)
SOSP
, pp. 175-188
-
-
Haeberlen, A.1
Kouznetsov, P.2
Druschel, P.3
-
9
-
-
45449105171
-
Information accountability
-
Jun.
-
D. J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, and G. J. Sussman, "Information accountability," Commun. ACM, vol. 51, no. 6, pp. 82-87, Jun. 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.6
, pp. 82-87
-
-
Weitzner, D.J.1
Abelson, H.2
Berners-Lee, T.3
Feigenbaum, J.4
Hendler, J.5
Sussman, G.J.6
-
10
-
-
70350381139
-
Towards a theory of accountability and audit
-
R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely, "Towards a theory of accountability and audit," in ESORICS, 2009, pp. 152-167.
-
(2009)
ESORICS
, pp. 152-167
-
-
Jagadeesan, R.1
Jeffrey, A.2
Pitcher, C.3
Riely, J.4
-
11
-
-
78649990816
-
Accountabiliy: Definition and relationship to verifiability
-
ACM Press
-
R. Küsters, T. Truderung, and A. Vogt, "Accountabiliy: Definition and Relationship to Verifiability," in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010). ACM Press, 2010, pp. 526-535.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010)
, pp. 526-535
-
-
Küsters, R.1
Truderung, T.2
Vogt, A.3
-
13
-
-
0001842747
-
Causes and explanations: A structural-model approach: Part i: Causes
-
ser. UAI'01. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc
-
J. Y. Halpern and J. Pearl, "Causes and explanations: a structural-model approach: part i: causes," in Proceedings of the Seventeenth conference on Uncertainty in artificial intelligence, ser. UAI'01. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2001, pp. 194-202.
-
(2001)
Proceedings of the Seventeenth Conference on Uncertainty in Artificial Intelligence
, pp. 194-202
-
-
Halpern, J.Y.1
Pearl, J.2
-
14
-
-
29144510111
-
Causes and explanations: A structural-model approach. Part I: Causes
-
-, "Causes and explanations: A structural-model approach. part i: Causes," British Journal for the Philosophy of Science, vol. 56, no. 4, pp. 843-887, 2005.
-
(2005)
British Journal for the Philosophy of Science
, vol.56
, Issue.4
, pp. 843-887
-
-
Halpern, J.Y.1
Pearl, J.2
-
15
-
-
0003398906
-
-
New York, NY, USA: Cambridge University Press
-
J. Pearl, Causality: models, reasoning, and inference. New York, NY, USA: Cambridge University Press, 2000.
-
(2000)
Causality: Models, Reasoning, and Inference
-
-
Pearl, J.1
-
16
-
-
0003743257
-
-
Reprinted Open Court Press, LaSalle, IL, 1748
-
D. Hume, "An Enquiry Concerning Human Understanding," Reprinted Open Court Press, LaSalle, IL, 1958, 1748.
-
(1958)
An Enquiry Concerning Human Understanding
-
-
Hume, D.1
-
17
-
-
0001122210
-
Causation
-
D. Lewis, "Causation," Journal of Philosophy, vol. 70, no. 17, pp. 556-567, 1973.
-
(1973)
Journal of Philosophy
, vol.70
, Issue.17
, pp. 556-567
-
-
Lewis, D.1
-
19
-
-
0000990212
-
Causes and conditions
-
J. L. Mackie, "Causes and Conditions," American Philosophical Quarterly, vol. 2, no. 4, pp. 245-264, 1965.
-
(1965)
American Philosophical Quarterly
, vol.2
, Issue.4
, pp. 245-264
-
-
Mackie, J.L.1
-
20
-
-
84928216342
-
Causation in tort law
-
R. Wright, "Causation in tort law," California Law Review 73, pp. 1735-1828, 1985.
-
(1985)
California Law Review
, vol.73
, pp. 1735-1828
-
-
Wright, R.1
-
21
-
-
84961335199
-
-
[Online]
-
J. Gatins, "Flight," 2012. [Online]. Available: http://www.imdb.com/title/tt1907668/
-
(2012)
Flight
-
-
Gatins, J.1
-
22
-
-
79951556197
-
Defaults and normality in causal structures
-
[Online]
-
J. Y. Halpern, "Defaults and Normality in Causal Structures," Artificial Intelligence, vol. 30, pp. 198-208, 2008. [Online]. Available: http://arxiv.org/abs/0806.2140
-
(2008)
Artificial Intelligence
, vol.30
, pp. 198-208
-
-
Halpern, J.Y.1
-
23
-
-
84855677477
-
Towards a formal model of accountability
-
ser. NSPW '11. New York, NY, USA: ACM
-
J. Feigenbaum, A. D. Jaggard, and R. N. Wright, "Towards a formal model of accountability," in Proceedings of the 2011 workshop on New security paradigms workshop, ser. NSPW '11. New York, NY, USA: ACM, 2011, pp. 45-56.
-
(2011)
Proceedings of the 2011 Workshop on New Security Paradigms Workshop
, pp. 45-56
-
-
Feigenbaum, J.1
Jaggard, A.D.2
Wright, R.N.3
-
24
-
-
84893312316
-
Accountability and deterrence in online life
-
ser. WebSci '11. NY, USA: ACM
-
J. Feigenbaum, J. A. Hendler, A. D. Jaggard, D. J. Weitzner, and R. N. Wright, "Accountability and deterrence in online life," in Proceedings of the 3rd International Web Science Conference, ser. WebSci '11. NY, USA: ACM, 2011, pp. 7:1-7:7.
-
(2011)
Proceedings of the 3rd International Web Science Conference
, pp. 1-7
-
-
Feigenbaum, J.1
Hendler, J.A.2
Jaggard, A.D.3
Weitzner, D.J.4
Wright, R.N.5
-
25
-
-
85034040740
-
Perspectives: Improving ssh-style host authentication with multipath probing
-
CA, USA: USENIX Association
-
D. Wendlandt, D. G. Andersen, and A. Perrig, "Perspectives: improving ssh-style host authentication with multipath probing," in USENIX 2008 Annual Technical Conference on Annual Technical Conference. CA, USA: USENIX Association, 2008.
-
(2008)
USENIX 2008 Annual Technical Conference on Annual Technical Conference
-
-
Wendlandt, D.1
Andersen, D.G.2
Perrig, A.3
-
27
-
-
0017996760
-
Ti clocks, and the ordering of events in a distributed system
-
July
-
L. Lamport, "Ti clocks, and the ordering of events in a distributed system," Commun. ACM, vol. 21, pp. 558-565, July 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 558-565
-
-
Lamport, L.1
-
28
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
-, "Proving the correctness of multiprocess programs," IEEE Transactions on Software Engineering, vol. 3, no. 2, pp. 125-143, 1977.
-
(1977)
IEEE Transactions on Software Engineering
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
30
-
-
84866905933
-
Securing interactive programs
-
ser. CSF '12. Washington, DC, USA: IEEE Computer Society, [Online]
-
W. Rafnsson, D. Hedin, and A. Sabelfeld, "Securing interactive programs," in Proceedings of the 2012 IEEE 25th Computer Security Foundations Symposium, ser. CSF '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 293-307. [Online]. Available: http://dx.doi.org/10.1109/CSF. 2012.15
-
(2012)
Proceedings of the 2012 IEEE 25th Computer Security Foundations Symposium
, pp. 293-307
-
-
Rafnsson, W.1
Hedin, D.2
Sabelfeld, A.3
-
31
-
-
84872777536
-
-
D. G. Johnson and J. W. Snapper, Eds. Belmont, CA, USA: Wadsworth Publ. Co., ch. Sua Culpa, [Online]
-
J. Feinberg, "Ethical issues in the use of computers," D. G. Johnson and J. W. Snapper, Eds. Belmont, CA, USA: Wadsworth Publ. Co., 1985, ch. Sua Culpa, pp. 102-120. [Online]. Available: http://dl.acm.org/citation.cfm?id=2569. 2675
-
(1985)
Ethical Issues in the Use of Computers
, pp. 102-120
-
-
Feinberg, J.1
-
32
-
-
84961345859
-
Program actions as actual causes: A building block for accountability
-
abs/1505.01131, [Online]
-
A. Datta, D. Garg, D. Kaynar, D. Sharma, and A. Sinha, "Program actions as actual causes: A building block for accountability," CoRR, vol. abs/1505.01131, 2015. [Online]. Available: http://arxiv.org/abs/1505.01131
-
(2015)
CoRR
-
-
Datta, A.1
Garg, D.2
Kaynar, D.3
Sharma, D.4
Sinha, A.5
-
33
-
-
29144482640
-
Causes and explanations: A structural-model approach. Part II: Explanations
-
J. Y. Halpern and J. Pearl, "Causes and explanations: A structural-model approach. part ii: Explanations," The British Journal for the Philosophy of Science, vol. 56, no. 4, pp. 889-911, 2005.
-
(2005)
The British Journal for the Philosophy of Science
, vol.56
, Issue.4
, pp. 889-911
-
-
Halpern, J.Y.1
Pearl, J.2
-
35
-
-
70350244866
-
Explaining counterexamples using causality
-
ser. CAV '09. Berlin, Heidelberg: Springer-Verlag, [Online]
-
I. Beer, S. Ben-David, H. Chockler, A. Orni, and R. Trefler, "Explaining counterexamples using causality," in Proceedings of the 21st International Conference on Computer Aided Verification, ser. CAV '09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 94-108. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-02658-4 11
-
(2009)
Proceedings of the 21st International Conference on Computer Aided Verification
, pp. 94-108
-
-
Beer, I.1
Ben-David, S.2
Chockler, H.3
Orni, A.4
Trefler, R.5
-
36
-
-
45749154214
-
What causes a system to satisfy a specification?
-
June. [Online]
-
H. Chockler, J. Y. Halpern, and O. Kupferman, "What causes a system to satisfy a specification?" ACM Trans. Comput. Logic, vol. 9, pp. 20:1-20:26, June 2008. [Online]. Available: http://doi.acm.org/10.1145/1352582.1352588
-
(2008)
ACM Trans. Comput. Logic
, vol.9
, pp. 1-26
-
-
Chockler, H.1
Halpern, J.Y.2
Kupferman, O.3
-
37
-
-
33749016257
-
Error explanation with distance metrics
-
A. Groce, S. Chaki, D. Kroening, and O. Strichman, "Error explanation with distance metrics," International Journal on Software Tools for Technology Transfer, vol. 8, no. 3, pp. 229-247, 2006.
-
(2006)
International Journal on Software Tools for Technology Transfer
, vol.8
, Issue.3
, pp. 229-247
-
-
Groce, A.1
Chaki, S.2
Kroening, D.3
Strichman, O.4
-
38
-
-
1442339050
-
From symptom to cause: Localizing errors in counterexample traces
-
ser. POPL '03. New York, NY, USA: ACM, [Online]
-
T. Ball, M. Naik, and S. K. Rajamani, "From symptom to cause: Localizing errors in counterexample traces," in Proceedings of the 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ser. POPL '03. New York, NY, USA: ACM, 2003, pp. 97-105. [Online]. Available: http://doi.acm.org/10.1145/604131.604140
-
(2003)
Proceedings of the 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 97-105
-
-
Ball, T.1
Naik, M.2
Rajamani, S.K.3
-
40
-
-
0034218583
-
Culpable control and the psychology of blame
-
M. D. Alicke, "Culpable control and the psychology of blame." Psychological bulletin, vol. 126, no. 4, p. 556, 2000.
-
(2000)
Psychological Bulletin
, vol.126
, Issue.4
, pp. 556
-
-
Alicke, M.D.1
-
41
-
-
84860549302
-
On blaming
-
L. Kenner, "On blaming," Mind, pp. 238-249, 1967.
-
(1967)
Mind
, pp. 238-249
-
-
Kenner, L.1
-
42
-
-
51249096942
-
Judgments of cause and blame: The effects of intentionality and foreseeability
-
D. A. Lagnado and S. Channon, "Judgments of cause and blame: The effects of intentionality and foreseeability," Cognition, vol. 108, no. 3, pp. 754-770, 2008.
-
(2008)
Cognition
, vol.108
, Issue.3
, pp. 754-770
-
-
Lagnado, D.A.1
Channon, S.2
-
43
-
-
35048898814
-
Privacy and utility in business processes
-
A. Barth, J. C. Mitchell, A. Datta, and S. Sundaram, "Privacy and utility in business processes," in CSF, 2007, pp. 279-294.
-
(2007)
CSF
, pp. 279-294
-
-
Barth, A.1
Mitchell, J.C.2
Datta, A.3
Sundaram, S.4
-
44
-
-
78650095281
-
Causality analysis in contract violation
-
ser. RV'10. Berlin, Heidelberg: Springer-Verlag
-
G. Gössler, D. Le Métayer, and J.-B. Raclet, "Causality analysis in contract violation," in Proceedings of the First International Conference on Runtime Verification, ser. RV'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 270-284.
-
(2010)
Proceedings of the First International Conference on Runtime Verification
, pp. 270-284
-
-
Gössler, G.1
Le Métayer, D.2
Raclet, J.-B.3
-
45
-
-
84877627816
-
Contract-based blame assignment by trace analysis
-
NY, USA: ACM
-
S. Wang, A. Ayoub, R. Ivanov, O. Sokolsky, and I. Lee, "Contract-based blame assignment by trace analysis," in Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems. NY, USA: ACM, 2013.
-
(2013)
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems
-
-
Wang, S.1
Ayoub, A.2
Ivanov, R.3
Sokolsky, O.4
Lee, I.5
-
47
-
-
84910148781
-
Blaming in componentbased real-time systems
-
ser. EMSOFT '14. ACM, [Online]
-
G. Gössler and L. As, tefənoaei, "Blaming in componentbased real-time systems," in Proceedings of the 14th International Conference on Embedded Software, ser. EMSOFT '14. ACM, 2014, pp. 7:1-7:10. [Online]. Available: http://doi.acm.org/10.1145/2656045.2656048
-
(2014)
Proceedings of the 14th International Conference on Embedded Software
, pp. 1-10
-
-
Gössler, G.1
As Tefənoaei, L.2
|