Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
From MaRDI portal
Publication:3522043
DOI10.1007/978-3-540-70525-3_7zbMath1143.03344OpenAlexW1499965485MaRDI QIDQ3522043
Nora Cuppens-Boulahia, Frédéric Cuppens
Publication date: 28 August 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70525-3_7
Logic in computer science (03B70) Computing methodologies for information systems (hypertext navigation, interfaces, decision support, etc.) (68U35)
Related Items (1)
Cites Work
- Unnamed Item
- A different approach to deontic logic: Deontic logic viewed as a variant of dynamic logic
- Action theory and social science. Some formal models
- Contrary-to-duty obligations
- High Level Conflict Management Strategies in Advanced Access Control Models
- A State/Event Temporal Deontic Logic
- Speech Acts with Institutional Effects in Agent Societies
- Protection in operating systems
- Deontic Logic in Computer Science
This page was built for publication: Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic