Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Decision support for systems security investment
Y Beresnevichiene, D Pym… - 2010 IEEE/IFIP Network …, 2010 - ieeexplore.ieee.org
Information security managers with fixed budgets must invest in security measures to
mitigate increasingly severe threats whilst maintaining the alignment of their systems with …
mitigate increasingly severe threats whilst maintaining the alignment of their systems with …
[HTML][HTML] A calculus and logic of bunched resources and processes
G Anderson, D Pym - Theoretical Computer Science, 2016 - Elsevier
Mathematical modelling and simulation modelling are fundamental tools of engineering,
science, and social sciences such as economics, and provide decision-support tools in …
science, and social sciences such as economics, and provide decision-support tools in …
The boundedly rational employee: Security economics for behaviour intervention support in organizations
Security policy-makers (influencers) in an organization set security policies that embody
intended behaviours for employees (as decision-makers) to follow. Decision-makers then …
intended behaviours for employees (as decision-makers) to follow. Decision-makers then …
Resource semantics: logic as a modelling technology
D Pym - ACM SIGLOG News, 2019 - dl.acm.org
The Logic of Bunched Implications (BI) was introduced by O'Hearn and Pym. The original
presentation of BI emphasised its role as a system for formal logic (broadly in the tradition of …
presentation of BI emphasised its role as a system for formal logic (broadly in the tradition of …
Inferentialist Resource Semantics
AV Gheorghiu, T Gu, DJ Pym - arxiv preprint arxiv:2402.09217, 2024 - arxiv.org
In systems modelling, a system typically comprises located resources relative to which
processes execute. One important use of logic in informatics is in modelling such systems for …
processes execute. One important use of logic in informatics is in modelling such systems for …
Improving security policy decisions with models
T Caulfield, D Pym - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Improving Security Policy Decisions with Models Page 1 34 September/October 2015
Copublished by the IEEE Computer and Reliability Societies 1540-7993/15/$31.00 © 2015 …
Copublished by the IEEE Computer and Reliability Societies 1540-7993/15/$31.00 © 2015 …
Minimalistic System Modelling: Behaviours, Interfaces, and Local Reasoning
D Galmiche, T Lang, D Pym - arxiv preprint arxiv:2401.16109, 2024 - arxiv.org
The infrastructure upon which the functioning of society depends is composed of complex
ecosystems of systems. Consequently, we must reason about the properties of such …
ecosystems of systems. Consequently, we must reason about the properties of such …
Enterprise information risk management: Dealing with cloud computing
A Baldwin, D Pym, S Shiu - Privacy and security for cloud computing, 2013 - Springer
Managing information risk is a complex task that must continually adapt to business and
technology changes. We argue that cloud computing presents a more significant step …
technology changes. We argue that cloud computing presents a more significant step …
Semantics for structured systems modelling and simulation
M Collinson, B Monahan, D Pym - 3rd International ICST Conference on …, 2010 - eudl.eu
Simulation modelling is an important tool for exploring and reasoning about complex
systems. Many supporting languages are available. Commonly occurring features of these …
systems. Many supporting languages are available. Commonly occurring features of these …
[HTML][HTML] A logic of separating modalities
JR Courtault, D Galmiche, D Pym - Theoretical Computer Science, 2016 - Elsevier
We present a logic of separating modalities, LSM, that is based on Boolean BI. LSM's
modalities, which generalize those of S4, combine, within a quite general relational …
modalities, which generalize those of S4, combine, within a quite general relational …