Pi-Calculus in Logical Form

Author(s):  
Marcello Bonsangue ◽  
Alexander Kurz
Keyword(s):  
1994 ◽  
Vol 16 (1) ◽  
pp. 53-64
Author(s):  
Chrsitopher Hookway
Keyword(s):  

2014 ◽  
Vol 36 (6) ◽  
pp. 1261-1266
Author(s):  
Xiang-Ning LI ◽  
Ke-Gang HAO ◽  
Xiao-Qun GUO
Keyword(s):  

Author(s):  
Donald Davidson

Donald Davidson’s 1970 Locke Lectures appear in print for the first time in this volume, accompanied by an introduction highlighting their significance as a snapshot of his evolving views in the philosophy of language and describing their relationship to the work he published during his lifetime. The lectures comprise an invaluable historical document that illuminates how Davidson was thinking about the theory of meaning, the role of a truth theory therein, the ontological commitments of a truth theory, the notion of logical form, and so on, at a pivotal moment in the development of his thought. Unlike Davidson’s previously published work, they are written so as to be presented to an audience as a fully organized and coherent exposition of his program in the philosophy of language. Had these lectures been widely available in the years following 1970, the reception of Davidson’s work, especially in the philosophy of language, might have been very different. Given the systematic nature of the presentation of Davidson’s semantic program in these lectures, it is hoped that they will be of use to those encountering his thought for the first time.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


1994 ◽  
Vol 11 ◽  
pp. 25-36
Author(s):  
Frank Drijkoningen
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document