Propositional calculus

Results: 1046



#Item
101Temporal Mode-Checking for Runtime Monitoring of Privacy Policies Omar Chowdhury§ , Limin Jia§ , Deepak Garg† , and Anupam Datta§ Carnegie Mellon University§ , Max Planck Institute for Software Systems† {omarc, l

Temporal Mode-Checking for Runtime Monitoring of Privacy Policies Omar Chowdhury§ , Limin Jia§ , Deepak Garg† , and Anupam Datta§ Carnegie Mellon University§ , Max Planck Institute for Software Systems† {omarc, l

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-02-12 12:31:57
102A Generalization of St˚ almarck’s Method⋆ Aditya Thakur1 and Thomas Reps1,2⋆⋆ 1  University of Wisconsin; Madison, WI, USA

A Generalization of St˚ almarck’s Method⋆ Aditya Thakur1 and Thomas Reps1,2⋆⋆ 1 University of Wisconsin; Madison, WI, USA

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2012-09-06 17:53:27
103Aristotle, Boole, and Chu Duality since 350 BC Vaughan Pratt Stanford University  August 27, 2015

Aristotle, Boole, and Chu Duality since 350 BC Vaughan Pratt Stanford University August 27, 2015

Add to Reading List

Source URL: boole.stanford.edu

Language: English - Date: 2015-08-27 01:51:39
104Verifying an Open Compiler Using Multi-Language Semantics James T. Perconti and Amal Ahmed Northeastern University Abstract. Existing verified compilers are proved correct under a closed-world assumption, i.e., that the

Verifying an Open Compiler Using Multi-Language Semantics James T. Perconti and Amal Ahmed Northeastern University Abstract. Existing verified compilers are proved correct under a closed-world assumption, i.e., that the

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2014-01-17 22:16:49
105Equideductive Logic and CCCs with Subspaces Paul Taylor Computer Laboratory University of Cambridge

Equideductive Logic and CCCs with Subspaces Paul Taylor Computer Laboratory University of Cambridge

Add to Reading List

Source URL: www.paultaylor.eu

Language: English - Date: 2009-02-12 12:35:41
106λ-RBAC: Programming with Role-Based Access Control Radha Jagadeesan1,? , Alan Jeffrey2,? , Corin Pitcher1?? , and James Riely1,? ? ? 1 2  School of CTI, DePaul University

λ-RBAC: Programming with Role-Based Access Control Radha Jagadeesan1,? , Alan Jeffrey2,? , Corin Pitcher1?? , and James Riely1,? ? ? 1 2 School of CTI, DePaul University

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:37:48
107Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:12
108Confidential Safety via Correspondence Assertions Radha Jagadeesan Alan Jeffrey  Corin Pitcher

Confidential Safety via Correspondence Assertions Radha Jagadeesan Alan Jeffrey Corin Pitcher

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:40:04
109Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg   Limin Jia

Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg Limin Jia

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-02-12 12:31:57
110

PDF Document

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:37:38