Computing Compliance

نویسندگان

  • Ivano Ciardelli
  • Irma Cornelisse
  • Jeroen Groenendijk
  • Floris Roelofsen
چکیده

Inquisitive semantics (cf. Groenendijk, 2008) provides a formal framework for reasoning about information exchange. The central logical notion that the semantics gives rise to is compliance. This paper presents an algorithm that computes the set of compliant responses to a given initiative. The algorithm is sound and complete. The implementation is accessible online via www.illc.uva.nl/inquisitive-semantics.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Taxonomy for Ensuring Institutional Compliance in Utility Computing

With the ongoing evolution from closed to open distributed systems and the lifting of the assumption that agents acting in such a system do not pursue own goals and act in the best interest of the society, new problems arise. One of them is that compliance cannot be assumed necessarily and consequently trust issues arise. One way of tackling this problem is by regulating the behavior of the age...

متن کامل

Automatisierte Compliance-zertifizierung Die Autoren

Die bisher manuelle Compliance-Zertifizierung von Workflows kann besonders im Cloud-Computing den Ansprüchen an Einhaltung verschiedenster Regularien und hohe Flexibilität nicht gerecht werden. Mit Comcert wurde in diesem Beitrag ein Verfahren zur automatisierten Analyse von Workflows vorgestellt. Hält ein Workflow die aufgestellten Regeln nicht ein, lokalisiert Comcert die Schwachstellen imWor...

متن کامل

Automating Compliance for Cloud Computing Services

We present an integrated approach for automating service providers’ compliance with data protection laws and regulations, business and technical requirements in cloud computing. The techniques we propose in particular include: natural-language analysis (of legislative and regulatory texts, and corporate security rulebooks) and extraction of enforceable rules, use of sticky policies, automated p...

متن کامل

Compliance tables for an EMS system with two types of medical response units

In this paper, we consider an Emergency Medical Services (EMS) system with two types of medical response units: Rapid Responder Ambulances (RRAs) and Regular Transport Ambulances (RTAs). The key difference between both is that RRAs are faster, but they lack the ability to transport a patient to the hospital. To maintain the ability to respond to emergency requests timely when ambulances get bus...

متن کامل

Economic, Social and Environmental Assessment of Electricity Generation from Renewable and Gas Technologies

Growing demand for electricity and the reduction of fossil fuels have made it essential to consider alternative and renewable energy sources, such as solar and wind, to generate electricity. In this paper, by computing levelized output energy cost and levelized cost of electricity, the prices of electricity generated from the different combined cycle, wind, and photovoltaic power plants are com...

متن کامل

Securing Processes for Outsourcing into the Cloud

Cloud computing is yet one of the leading developments and depicts the biggest progress in web technologies. It offers a convenient way for using shared and easy accessible resources, in both a web-based and demandoriented sense. However, cloud computing brings concept-based risks, e.g. the risk of private data becoming publicly available. Outsourcing of services into a cloud computing environm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009