Zobrazeno 1 - 10
of 28
pro vyhledávání: '"David Pym"'
Autor:
Tristan Caulfield, David Pym
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 3, Iss 8, Pp 1-10 (2016)
Security managers face the challenge of designing security policies that deliver the objectives required by their organizations. We explain how a rigorous modelling framework and methodology—grounded in semantically justified mathematical systems m
Externí odkaz:
https://doaj.org/article/c65f0a2e99434a3caf3db6b49ad55fe0
Autor:
Simon Docherty, David Pym
Publikováno v:
Logical Methods in Computer Science, Vol Volume 15, Issue 1 (2019)
Stone-type duality theorems, which relate algebraic and relational/topological models, are important tools in logic because -- in addition to elegant abstraction -- they strengthen soundness and completeness to a categorical equivalence, yielding a f
Externí odkaz:
https://doaj.org/article/6d31459f5aa94a5da35fe820bc84bafd
Autor:
Simon Docherty, David Pym
Publikováno v:
Logical Methods in Computer Science, Vol Volume 14, Issue 4 (2018)
Models of complex systems are widely used in the physical and social sciences, and the concept of layering, typically building upon graph-theoretic structure, is a common feature. We describe an intuitionistic substructural logic called ILGL that giv
Externí odkaz:
https://doaj.org/article/2977ce04760a4df282b2d49aa0c34021
Publikováno v:
Journal of Computer Security. 30:435-464
Security policy-makers (influencers) in an organization set security policies that embody intended behaviours for employees (as decision-makers) to follow. Decision-makers then face choices, where this is not simply a binary decision of whether to co
Publikováno v:
IFAC-PapersOnLine. 55:253-258
Publikováno v:
Simulation Tools and Techniques ISBN: 9783030971236
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4511a2f69da27555248c6380831959fd
https://doi.org/10.1007/978-3-030-97124-3_21
https://doi.org/10.1007/978-3-030-97124-3_21
Publikováno v:
Socio-Technical Aspects in Security ISBN: 9783031101823
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::019eef50f4bdf33f279fad79ab1f45ce
https://doi.org/10.1007/978-3-031-10183-0_6
https://doi.org/10.1007/978-3-031-10183-0_6
Publikováno v:
Simulation Tools and Techniques ISBN: 9783030971236
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cd3cbe75163826c85c70e65d7521af5e
https://doi.org/10.1007/978-3-030-97124-3_23
https://doi.org/10.1007/978-3-030-97124-3_23
Publikováno v:
Simulation Tools and Techniques ISBN: 9783030971236
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3c390a7a1acad965feb30fb269fbc9c8
https://doi.org/10.1007/978-3-030-97124-3_22
https://doi.org/10.1007/978-3-030-97124-3_22
Publikováno v:
IOT
Controlling asset-access has traditionally been considered a matter for systems in which assets reside. Centralized approaches to access control are, however, problematic for the IoT. One reason for this is that devices may not be confined to a singl