PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Between syntax and semantics of resource oriented logic for ids behavior description

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Linear logic appears as a suitable logical system for description of dynamic properties of various network activities in computer science. It disposes with new connectives which create new opportunities to describe properties of real network processes, e.g. parallelism, causality and commutativity of duality between processes. We extend this logic with Aristotelian modalities and we formulate their appropriate model. In our contribution we show how a real network attack can be formalized in this logical system as a polarized game.
Rocznik
Strony
105--118
Opis fizyczny
Bibliogr. 14 poz., rys., tab.
Twórcy
autor
  • Department of Computers and Informatics Faculty of Electrical Engineering and Informatics Technical University of Košice Košice, Slovakia
autor
  • Department of Computers and Informatics Faculty of Electrical Engineering and Informatics Technical University of Košice Košice, Slovakia
autor
  • Department of Computers and Informatics Faculty of Electrical Engineering and Informatics Technical University of Košice Košice, Slovakia
Bibliografia
  • [1] Vokorokos L., Baláž A., Adám N., Secure web server system resources utilization, Acta Polytechnica Hungarica 2015, 12, 2, 5-19. Available at: https://uni-obuda.hu/journal/Vokorokos_Balaz_Adam_58.pdf
  • [2] Vokorokos L., Baláž A., Madoš B., Application security through sandbox virtualization, Acta Polytechnica Hungarica 2015, 12, 1, 83-101. Available at: https://uni-obuda.hu/journal/Vokorokos_Balaz_Mados_57.pdf
  • [3] Ennert M., Chovancová E., Dudláková Z., Testing of IDS model using several intrusion detection tools, Journal of Applied Mathematics and Computational Mechanics 2015, 14, 1, 55-62. Available at: http://dx.doi.org/10.17512/jamcm.2015.1.05
  • [4] Mihályi D., Novitzká V., Towards to the knowledge in coalgebraic model IDS, Computing and Informatics 2014, 33, 1, 61-78.
  • [5] Perháč J., Mihályi D., Intrusion detection system behavior as resource-oriented formula, Acta Electrotechnica et Informatica 2015, 15, 3, 9-13, DOI: 10.15546/aeei-2015-0022. Available at:http://www.aei.tuke.sk/papers/2015/3/02_Perha%C4%8D.pdf
  • [6] Perháč J., Mihályi D., Coalgebraic modeling of IDS behavior, IEEE 13th International Scientific Conference on Informatics, November 18-20, 2015, Poprad, Slovakia, Danvers: IEEE, 2015, 201-205, DOI: 10.1109/Informatics.2015.7377833
  • [7] Mihályi D., Novitzká V., Ľaľová M., Intrusion detection system episteme, Central European Journal of Computer Science 2012, 2, 3, 214-220.
  • [8] Girard J.-Y., The Blind Spot. Lectures on Proof-theory, Institut de Mathématiques de Luminy, Marseille, France, 2011, ISBN 978-3-03719088-3.
  • [9] Novitzká V., Mihályi D., Slodičák V., Linear logical reasoning on programming. Acta Electrotechnica et Informatica 2006, 6, 3, 34-39. Available at: http://www.aei.tuke.sk/papers/2006/3/Novitzka.pdf
  • [10] Steingartner W., Poláková A., Prazňák P., Novitzká V., Linear logic in computer science. Journal of Applied Mathematics and Computational Mechanics 2015, 14(1), 91-100. Available at: http://dx.doi.org/10.17512/jamcm.2015.1.09
  • [11] Girard J.-Y., Locus solum: From the rules of logic to the logic of rules, Mathematical Structures in Computer Science 2001, 11, 3, 301-506.
  • [12] Kurz A., Coalgebras and Modal Logic. Lecture notes, CWI, Amsterdam 2001.
  • [13] Mihályi D., Novitzká V., What about linear logic in computer science? Acta Polytechnica Hungarica 2013, 10, 4, 147-160. Available at: http://www.uni-obuda.hu/journal/Mihalyi_Novitzka_42.pdf
  • [14] Novitzká V., Slodičák V., On applying stochastic problems in higher-order theories, Acta Electrotechnica et Informatica 2007, 7, 3.
Uwagi
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b9ac8ad8-5688-4db5-a4e8-f02ab5826b6a
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.