Knowledge System for Application of Computer Security Rules

被引:0
|
作者
Felipe Rolando, Menchaca Garcia [1 ]
Hernandez Salvador, Contreras [1 ]
机构
[1] IPN, Ctr Res Comp, Mexico City 07738, DF, Mexico
关键词
possible worlds; knowledge; common knowledge; ontology; security rules;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Epistemic Logic is applied to diverse fields of the computing science, particularly to those related to systems constituted by agents. Such systems have an interesting range of applications themselves. In this paper, a logic system applied to the evaluation of Multilevel and Commercial computer security rules is discussed. The system is defined by axioms and rules, and the concepts of the security models are then considered in order to evaluate the rules. It is showed how to lead to certain formulas in order to determine the validity of the set of fundamental expressions that constitute the security models. It uses a system S5.
引用
收藏
页码:9 / 17
页数:9
相关论文
共 50 条
  • [1] AN APPLICATION OF FUZZY ALGORITHMS IN A COMPUTER ACCESS SECURITY SYSTEM
    HUSSIEN, B
    MCLAREN, R
    BLEHA, S
    [J]. PATTERN RECOGNITION LETTERS, 1989, 9 (01) : 39 - 43
  • [2] Study and Application on Security Technology of Computer Information System
    Liu, Yan
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 325 - 328
  • [3] APPLICATION OF KNOWLEDGE ENGINEERING TO COMPUTER-SYSTEM DIAGNOSIS
    YOSHIDA, M
    NAMBA, D
    IKEDA, S
    BABA, M
    [J]. REVIEW OF THE ELECTRICAL COMMUNICATIONS LABORATORIES, 1989, 37 (01): : 9 - 14
  • [4] Computer export rules trigger security debate
    Mann, P
    [J]. AVIATION WEEK & SPACE TECHNOLOGY, 1997, 147 (20): : 92 - 93
  • [5] Research on Measures for Computer Application System Security Technology Strengthening
    Xi, Guihua
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 238 - 241
  • [6] Application of computer network security technology for electric power system
    Zhu, Enguo
    Wu, Guoliang
    Yang, Gongxun
    [J]. ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 187 - 190
  • [7] Anomaly detection in computer security and an application to file system accesses
    Stolfo, SJ
    Hershkop, S
    Bui, LH
    Ferster, R
    Wang, K
    [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, 3488 : 14 - 28
  • [8] Estimating computer network security scenarios with association rules
    Singha, Anjani Kumar
    Singh, Harsh Pratap
    Kundu, Shakti
    Tiwari, Pradeep Kumar
    Rajput, Ajeet Singh
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 223 - 236
  • [9] Fuzzy expert system shell development with computer security assessment application
    Remik, Leon
    Jacques, Robert St.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-4, 2007, : 253 - 258
  • [10] The Application of fuzzy-ANP in Evaluation Index System of Computer Security
    Li, Baozhu
    Bi, Ran
    [J]. ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 754 - 759