International Conference on Lightning Protection, 2016
P-rho-Log extends Prolog by conditional transformations that are controlled by strategies. We giv... more P-rho-Log extends Prolog by conditional transformations that are controlled by strategies. We give a brief overview of the tool and illustrate its capabilities.
Anti-unification (AU) is a fundamental operation for generalization computation used for inductiv... more Anti-unification (AU) is a fundamental operation for generalization computation used for inductive inference. It is the dual operation to unification, an operation at the foundation of automated theorem proving. Interest in AU from the AI and related communities is growing, but without a systematic study of the concept nor surveys of existing work, investigations often resort to developing application-specific methods that existing approaches may cover. We provide the first survey of AU research and its applications and a general framework for categorizing existing and future developments.
Applications of Mathematics and Informatics in Natural Sciences and Engineering, 2020
Attribute-based access control (ABAC) is a logical access control paradigm whereby access rights ... more Attribute-based access control (ABAC) is a logical access control paradigm whereby access rights to system resources are granted through the use of policies that are evaluated against the attributes of entities (user, subject, and object), operations, and the environment relevant to a request. Many ABAC models, with different variations, have been proposed and formalized. Since the access control policies that can be implemented in ABAC have inherent rule-based specifications, it is natural to adopt a rule-based framework to specify and analyse their properties. We describe the design and implementation of a software tool implemented in Mathematica. Our tool makes use of the rule-based capabilities of a rule-based package developed by us, can be used to specify configurations for the foundational model ABACα of ABAC, and to check safety properties.
International Conference on Lightning Protection, 2016
P-rho-Log extends Prolog by conditional transformations that are controlled by strategies. We giv... more P-rho-Log extends Prolog by conditional transformations that are controlled by strategies. We give a brief overview of the tool and illustrate its capabilities.
Anti-unification (AU) is a fundamental operation for generalization computation used for inductiv... more Anti-unification (AU) is a fundamental operation for generalization computation used for inductive inference. It is the dual operation to unification, an operation at the foundation of automated theorem proving. Interest in AU from the AI and related communities is growing, but without a systematic study of the concept nor surveys of existing work, investigations often resort to developing application-specific methods that existing approaches may cover. We provide the first survey of AU research and its applications and a general framework for categorizing existing and future developments.
Applications of Mathematics and Informatics in Natural Sciences and Engineering, 2020
Attribute-based access control (ABAC) is a logical access control paradigm whereby access rights ... more Attribute-based access control (ABAC) is a logical access control paradigm whereby access rights to system resources are granted through the use of policies that are evaluated against the attributes of entities (user, subject, and object), operations, and the environment relevant to a request. Many ABAC models, with different variations, have been proposed and formalized. Since the access control policies that can be implemented in ABAC have inherent rule-based specifications, it is natural to adopt a rule-based framework to specify and analyse their properties. We describe the design and implementation of a software tool implemented in Mathematica. Our tool makes use of the rule-based capabilities of a rule-based package developed by us, can be used to specify configurations for the foundational model ABACα of ABAC, and to check safety properties.
Uploads
Papers