Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJanuary 2005
Combining logics for modelling security policies
ACSC '05: Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38Pages 323–332This paper considers a logical framework for modelling security policies for information systems. Epistemic, deontic and temporal logics can respectively be used to express what an agent knows or believes, what an agent is permitted or forbidden to know ...
- ArticleJanuary 2005
Agent-based distributed software verification
ACSC '05: Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38Pages 159–164Despite decades of research, the takeup of formal methods for developing provably correct software in industry remains slow. One reason for this is the high cost of proof construction, an activity that, due to the complexity of the required proofs, is ...