Results for 'semantic security'

973 found
Order:
  1.  38
    Semantic Information and Information Security : Definitional Issues.Björn Lundgren - unknown
    This licentiate thesis consist of two separate research papers which concern two tangential topics – that of semantic information and that of information security. Both topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I – concerning the concept of information, and a semantic conception thereof – the conceptual, and definitional, issues focus on one property, that of truthfulness. It is argued – against the veridicality thesis – that (...) information need not be truthful. In Paper II – concerning information security – it is argued that the current leading definitions (so-called ‘CIA’ definitions, which define information as secure if, and only if, the properties of confidentiality, integrity, and availability are retained) suffer from both actual and possible counter-examples, and lack an appropriate conceptual sense. On the basis of this criticism a new kind of definitions is proposed and argued for. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  74
    Update Semantics of Security Protocols.Arjen Hommersom, John-Jules Meyer & Erik De Vink - 2004 - Synthese 142 (2):229 - 267.
    We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between these based on updates of the agent's beliefs associated with steps in the protocol. As a case study we will consider the SRA Three Pass protocol and discuss the Wide-Mouthed Frog protocol.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3. Semantic Technology in Intelligence, Defense and Security (STIDS), CEUR vol. 1304.Erik Thomsen, Fred Read, William Duncan, Tatiana Malyuta & Barry Smith (eds.) - 2014
    No categories
     
    Export citation  
     
    Bookmark  
  4. Semantic Technology in Intelligence, Defense and Security (STIDS), CEUR, vol. 1304.Neil Otte, Brian Donohue & Barry Smith (eds.) - 2014 - CEUR.
    No categories
     
    Export citation  
     
    Bookmark  
  5. Action-Directed Pragmatics Secures Semantically Autonomous Knowledge.Igal Kvart - manuscript
    In the past couple of decades, there were a few major attempts to establish the thesis of pragmatic infringement – that a significant pragmatic ingredient figures significantly in the truth-conditions for knowledge-ascriptions. As candidates, epistemic contextualism and Relativism flaunted conversational standards, and Stanley's SSI promoted stakes. These conceptions were propelled first and foremost by obviously pragmatic examples of knowledge ascriptions that seem to require a pragmatic component in the truth-conditions of knowledge ascriptions in order to be accounted for. However, if (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  6. (1 other version)Semantic normativity.Åsa Maria Wikforss - 2001 - Philosophical Studies 102 (2):203-26.
    My paper examines the popular idea, defended by Kripke, that meaning is an essentially normative notion. I consider four common versions of this idea and suggest that none of them can be supported, either because the alleged normativity has nothing to do with normativity or because it cannot plausibly be said that meaning is normative in the sense suggested. I argue that contrary to received opinion, we don’t need normativity to secure the possibility of meaning. I conclude by considering the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   99 citations  
  7.  91
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert van der Torre - 2009 - Studia Logica 92 (3):395-436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  8.  59
    A security framework for dynamic collaborative working environments.Matthias Assel, Stefan Wesner & Alexander Kipp - 2009 - Identity in the Information Society 2 (2):171-187.
    Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic Virtual (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  9.  86
    Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
    Security police, state security services, security measures, security politics…a dreadful semantic chain. Everything stubbornly conservative, repressive, antithetical to freedom is expressed in the concept of security. The meaning always implies security for an established order against whatever seems to threaten, disturb or endanger it from without or from within. One can secure, reassure, insure or protect Movements, associations and networks within which a part of the population unites spontaneously can be channeled, controlled or (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  16
    Hybrid War as a Phenomenon of Semantic Postmodern Discourse with Emphasis on the Military Constant as a Factor of National Security.Andriy Tkachuk & Pavlo Tkachuk - 2021 - Postmodern Openings 12 (3):190-215.
    The article states the core thesis about two asymmetric modes of existence of war – physical and discursive. The purpose of the article is to substantiate the analytical and practical necessity of distinguishing between two modes of existence of hybrid warfare as a phenomenon of physical reality and as a discursive construct, as well as to raise questions about the value specificity of the relationship between them. The methodology of work represents the implication of two asymmetric modes of war existence (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. The Semantics of Untrustworthiness.Giuseppe Primiero & Laszlo Kosolosky - 2016 - Topoi 35 (1):253-266.
    We offer a formal treatment of the semantics of both complete and incomplete mistrustful or distrustful information transmissions. The semantics of such relations is analysed in view of rules that define the behaviour of a receiving agent. We justify this approach in view of human agent communications and secure system design. We further specify some properties of such relations.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  12. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi, 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. Hybrid Information Technology Using Computational Intelligence-Security Intelligence: Web Contents Security System for Semantic Web.Nam-Deok Cho, Eun-ser Lee & Hyun-gun Park - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 4252--819.
     
    Export citation  
     
    Bookmark  
  15. Proceedings of the Conference on Semantic Technology in Intelligence, Defense and Security (STIDS), CEUR.Barry Smith, Tatiana Malyuta, William S. Mandrick, Chia Fu, Kesny Parent & Milan Patel (eds.) - 2012
    No categories
     
    Export citation  
     
    Bookmark  
  16. Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued that the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  62
    Infectious Diseases, Security and Ethics: The Case of Hiv/Aids.Michaelj Selgelid - 2008 - Bioethics 22 (9):457-465.
    Securitization of infectious diseases may involve suspension of ordinary human rights and liberties. In the event of an epidemic, therefore, it is important to limit the occasions upon which draconian disease control measures are implemented in the name of security. The term ‘security’, moreover, should not be used too loosely if it is to retain force and meaning in political discourse. It may be argued that the bar for disease securitization should be set high so that it is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  69
    Online Security: What’s in a Name? [REVIEW]Anat Biletzki - 2013 - Philosophy and Technology 26 (4):397-410.
    This article motions to a real contradiction between online security and civil rights. It traverses semantic and conceptual elaborations of both security and human rights, narrowing their range to national security and human rather than civil rights, and suggests that the concept of security itself, whether online or not, is a rhetorical instrument in the hands of interested parties, mostly states and militaries. This instrument is used to undermine human rights precisely by means of its (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  19.  38
    Society semantics and the logic way to collective intelligence.Walter Carnielli & Mamede Lima-Marques - 2017 - Journal of Applied Non-Classical Logics 27 (3-4):255-268.
    The so-called phenomenon of collective intelligence is now a burgeoning movement, with several guises and examples in many areas. We briefly survey some relevant aspects of collective intelligence in several formats, such as social software, crowdfunding and convergence, and show that a formal version of this paradigm can also be posed to logic systems, by employing the notion of logic societies. The paradigm of logical societies has lead to a new notion of distributed semantics, the society semantics, with theoretical advances (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20. A Bridge from Semantic Value to Content.Brian Rabern - 2017 - Philosophical Topics 45 (2):181-207.
    A common view relating compositional semantics and the objects of assertion holds the following: Sentences φ and ψ expresses the same proposition iff φ and ψ have the same modal profile. Following Dummett, Evans, and Lewis, Stanley argues that this view is fundamentally mistaken. According to Dummett, we must distinguish the semantic contribution a sentence makes to more complex expressions in which it occurs from its assertoric content. Stojnić insists that views which distinguish the roles of content and (...) value must nevertheless ensure a tight connection between the two. But, she contends, there is a crucial disanalogy between the views that follow Lewis and the views that follow Dummett. Stanley’s Dummettian view is argued to contain a fatal flaw: On such views, there is no way to secure an appropriate connection between semantic value and a theoretically motivated notion of assertoric content. I will review the background issues from Dummett, Evans, Lewis, and Stanley, and provide a principled way of bridging the gap between semantic value and a theoretically motivated notion of assertoric content. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  21.  64
    Semantic and structural problems in evolutionary ethics.K. G. Ferguson - 2001 - Biology and Philosophy 16 (1):69-84.
    In ''''A Defense of Evolutionary Ethics'''' (1986), Robert J. Richardsendeavors to explain how moral ''oughts'' can be derived from thescience of evolutionary biology without committing the dreadednaturalistic fallacy. First, Richards assumes that ''ought'' as usedin ethical discourse bears the same meaning as ''ought'' used anywherein science, indicating merely that certain results or behaviors arepredicted based on prior structured contexts. To this extent, themoral behavior of animals, what they ''ought'' to do, could arguablybe predicted by evolutionary biology as effectively as, say,molecular (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22. Magic, semantics, and Putnam’s vat brains.Mark Sprevak & Christina Mcleish - 2003 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 35 (2):227-236.
    In this paper we offer an exegesis of Hilary Putnam’s classic argument against the brain-in-avat hypothesis offered in his Reason, truth and history (1981). In it, Putnam argues that we cannot be brains in a vat because the semantics of the situation make it incoherent for anyone to wonder whether they are a brain a vat. Putnam’s argument is that in order for ‘I am a brain in a vat’ to be true, the person uttering it would have to be (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  23. Kripkean Meta-Semantics and Generalized Rigidity.Christian Nimtz - 2019 - Philosophical Quarterly 69 (275):332-353.
    The classification-cum-explanation Kripke assigns to rigidity requires the notion to apply to singular and general terms alike. But Kripke's own notion of rigidity is tailor-made for singular terms, and an extensive debate has not secured a general notion of rigidity apt to provide the classification-cum-explanation Kripke aims for. I propose that we look for a Kripkean alternative to generalized rigidity. I argue that on Kripkean premises, natural kind terms and proper names belong to the meta-semantic category of paradigm terms. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  24. IFIP WG 2.12 and WG 12.4 International Workshop on Web Semantic (SWWS)-Security, Risk and Privacy for the Semantic Web-An OWL Copyright Ontology for Semantic Digital Rights Management. [REVIEW]Roberto Gil Garcia - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 1745-1754.
     
    Export citation  
     
    Bookmark  
  25.  85
    The Advantage of Semantic Theory Over Predicate Calculus In The Representation of Logical Form In Natural Language.Jerrold J. Katz - 1977 - The Monist 60 (3):380-405.
    Constructs developed for the semantics of artificial languages are often proposed as the proper description of aspects of the semantics of natural languages. Most of us are familiar with the claims that conjunction, disjunction, negation, and material implication in standard versions of propositional calculus describe the meaning of “and”, “or”, “not”, and “if …, then …” in English. The argument for such claims is not only that these constructs account for meanings in English but that they offer the advantage of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  26.  65
    Semantics for Natural Kind Terms.Harry Deutsch - 1993 - Canadian Journal of Philosophy 23 (3):389 - 411.
    According to the well-known Kripke-Putnam view developed in Naming and Necessity and ‘The Meaning of Meaning’, proper names and ‘natural kind terms’ - words for natural substances, species, and phenomena - are non-descriptional and rigid. A singular term is rigid if it has the same referent in every possible world, and is non-descriptional if, roughly speaking, its referent is not secured by purely descriptive conditions analytically tied to the term. Thus, ‘the inventor of bifocals’ is nonrigid and descriptional, while ‘the (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  27.  55
    Investigations into Information Semantics and Ethics of Computing.Gordana Dodig-Crnkovic - 2005 - Dissertation, Mälardalen
    The recent development of the research field of Computing and Philosophy has triggered investigations into the theoretical foundations of computing and information. This thesis consists of two parts which are the result of studies in two areas of Philosophy of Computing and Philosophy of Information regarding the production of meaning and the value system with applications. The first part develops a unified dual-aspect theory of information and computation, in which information is characterized as structure, and computation is the information dynamics. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  28. A State-of-Affairs-Semantic Solution to the Problem of Extensionality in Free Logic.Hans-Peter Leeb - 2020 - Journal of Philosophical Logic 49 (6):1091-1109.
    If one takes seriously the idea that a scientific language must be extensional, and accepts Quine’s notion of truth-value-related extensionality, and also recognizes that a scientific language must allow for singular terms that do not refer to existing objects, then there is a problem, since this combination of assumptions must be inconsistent. I will argue for a particular solution to the problem, namely, changing what is meant by the word ‘extensionality’, so that it would not be the truth-value that had (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  66
    Duns Scotus on the Semantic Content of Cognitive Acts and Species.Richard Cross - 2010 - Quaestio 10:135-154.
    Scotus holds that dispositional and occurrent cognitions (intelligible species and acts of cognition, in the medieval jargon) are qualities that inhere in the soul. These qualities have semantic or conceptual content. I show that such content is nothing in any sense real, and that this content consists either in the relevant quality’s being (factually) measured by an extramental object, or in its being such that it would be measured (counterfactually) by such an object in the case that there were (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  24
    The contingency of prophetic semantics in Walter Chatton’s Lectura.Jon Bornholdt - 2022 - Bochumer Philosophisches Jahrbuch Fur Antike Und Mittelalter 25 (1):78-97.
    This paper examines Walter Chatton’s discussion of the problem of prophesied future contingents in his Lectura super Sententias. Faced with the challenge of reconciling the supposedly veridical character of divine prophecy with human freedom to do otherwise, Chatton casts the relation of prophecy to event in the form of a logical consequentia and formulates two rules which depend on the character of the antecedent in question. In the case of antecedents involving divine knowledge and related phenomena, the freedom of the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  95
    The Logical Possibility of Moral Dilemmas in Expressivist Semantics.Ryo Tanaka - 2024 - European Journal of Analytic Philosophy 20 (1):55-85.
    In this paper, using Mark Schroeder’s (2008a) expressivist semantic framework for normative language as a case study, I will identify difficulties that even an expressivist semantic theory capable of addressing the Frege-Geach problem will encounter in handling the logical possibility of moral dilemmas. To this end, I will draw on a classical puzzle formulated by McConnell (1978) that the logical possibility of moral dilemmas conflicts with some of the prima facie plausible axioms of the standard deontic logic, which (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  32.  52
    Linguistic Patterns of Modality in UN Resolutions: The Role of Shall, Should, and May in Security Council Resolutions Relating to the Second Gulf War.Giuseppina Scotto di Carlo - 2017 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 30 (2):223-244.
    This paper will discuss the role of modality in UN Security Council resolutions. As a work in progress on whether the use of strategic vagueness in UN resolutions has contributed to the outbreak of the second Gulf war, this work proposes a qualitative and quantitative analysis on the role of vagueness of the central modal verbs shall, should, and may in the institutional language of the UN, drawing upon Wodak’s Discourse-Historical Approach and Jenkins, Gotti, and Trosborg's theories on modality. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  31
    A Review of Semantic Sensor Technologies in Internet of Things Architectures. [REVIEW]Gergely Marcell Honti & Janos Abonyi - 2019 - Complexity 2019:1-21.
    Intelligent sensors should be seamlessly, securely, and trustworthy interconnected to enable automated high-level smart applications. Semantic metadata can provide contextual information to support the accessibility of these features, making it easier for machines and humans to process the sensory data and achieve interoperability. The unique overview of sensor ontologies according to the semantic needs of the layers of IoT solutions can serve a guideline of engineers and researchers interested in the development of intelligent sensor-based solutions. The explored trends (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Horizontal Integration of Warfighter Intelligence Data: A Shared Semantic Resource for the Intelligence Community.Barry Smith, Tatiana Malyuta, William S. Mandrick, Chia Fu, Kesny Parent & Milan Patel - 2012 - In Barry Smith, Tatiana Malyuta, William S. Mandrick, Chia Fu, Kesny Parent & Milan Patel, Proceedings of the Conference on Semantic Technology in Intelligence, Defense and Security (STIDS), CEUR. pp. 1-8.
    We describe a strategy that is being used for the horizontal integration of warfighter intelligence data within the framework of the US Army’s Distributed Common Ground System Standard Cloud (DSC) initiative. The strategy rests on the development of a set of ontologies that are being incrementally applied to bring about what we call the ‘semantic enhancement’ of data models used within each intelligence discipline. We show how the strategy can help to overcome familiar tendencies to stovepiping of intelligence data, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  35.  47
    The Basis of Semantic Structure.Michael Beebe - 1976 - Dialogue 15 (4):624-641.
    The Concept of the whole utterance, we are inclined to to believe, is basic in meaning-theory. But any theory which locates a conceptual base must show how items in the super-structure relate to that base, and so for theories of meaning. There are units of meaning both larger and smaller than whole utterances: narrative, in which several whole utterances follow one another in some organized fashion, seems relatively unproblematic, but the relations of meaningful parts of utterances to the utterances themselves (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  36. Models and theories I: The semantic view revisited.Chuang Liu - 1997 - International Studies in the Philosophy of Science 11 (2):147 – 164.
    The paper, as Part I of a two-part series, argues for a hybrid formulation of the semantic view of scientific theories. For stage-setting, it first reviews the elements of the model theory in mathematical logic (on whose foundation the semantic view rests), the syntactic and the semantic view, and the different notions of models used in the practice of science. The paper then argues for an integration of the notions into the semantic view, and thereby offers (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  37. Jon Barwise's papers on natural language semantics.Keith Devlin - 2004 - Bulletin of Symbolic Logic 10 (1):54-85.
    For most of the 1980s, Jon Barwise focused much of his research in the area of natural language semantics. This article surveys his research publications in that area.Most, but not all, of those publications were in the area of situation semantics, a new approach to natural language semantics Barwise developed jointly with his colleague John Perry in the first half of the 1980s. That work was both blessed, and cursed, by becoming closely identified in academic circles with the award of (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Reasoning about Information Assurance Policy with Uncertainty using the Semantic Web.Stephen F. Bush - forthcoming - Annual Symposium on Information Assurance:1--7.
    This is a brief letter outlining speculative ideas for semantic web reasoning about information assurance. Much work has been done on the development of semantic web applications for reasoning about information assurance. A significant portion of this work is focused upon semantic web ontologies and reasoning about security policies and the underlying implementation of those policies. While numerous semantic web-based security policy ontologies and reasoners exist, both academically and commercially, I will briefly focus on (...)
     
    Export citation  
     
    Bookmark  
  39.  20
    Determination of meaning in a multilingual aligned corpus: the case of UN Security Council resolution 242 (1967) and of the English plural zero determiner. [REVIEW]Gaetan Moreau - 2020 - Corpus 20.
    L’ambiguïté du sens de la résolution 242 (1967) du Conseil de sécurité est un problème classique de l’interprétation en droit international. Celle-ci repose sur l’ambiguïté de la signification du déterminant zéro pluriel anglais, le sens générique d’une part, qui emporte tous les éléments du groupe, et le sens catégoriel d’autre part, qui lui ne dit rien sur la quantité considérée. Ce déterminant zéro pluriel anglais se traduit en français par différents déterminants pluriels : défini pour le sens générique, indéfini pour (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  45
    The institution of critique and the critique of institutions.Craig Browne - 2014 - Thesis Eleven 124 (1):20-52.
    My paper argues that Luc Boltanski’s pragmatic sociology makes an important contribution to two central concerns of critical theory: the empirical analysis of the contradictions and conflicts of capitalist societies and the reflexive clarification of the epistemological and normative grounds of critique. I show how Boltanski’s assessment of the limitations of Bourdieu’s critical sociology significantly influenced his pragmatic sociology of critique and explication of the political philosophies present in actors’ practices of dispute and justification. Although pragmatism has revealed how social (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  14
    Structural analysis of code-based algorithms of the NIST post-quantum call.M. A. González de la Torre, L. Hernández Encinas & J. I. Sánchez García - forthcoming - Logic Journal of the IGPL.
    Code-based cryptography is currently the second most promising post-quantum mathematical tool for quantum-resistant algorithms. Since in 2022 the first post-quantum standard Key Encapsulation Mechanism, Kyber (a latticed-based algorithm), was selected to be established as standard, and after that the National Institute of Standards and Technology post-quantum standardization call focused in code-based cryptosystems. Three of the four candidates that remain in the fourth round are code-based algorithms. In fact, the only non-code-based algorithm (SIKE) is now considered vulnerable. Due to this landscape, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. Impossible Worlds and the Logic of Imagination.Francesco Berto - 2017 - Erkenntnis 82 (6):1277-1297.
    I want to model a finite, fallible cognitive agent who imagines that p in the sense of mentally representing a scenario—a configuration of objects and properties—correctly described by p. I propose to capture imagination, so understood, via variably strict world quantifiers, in a modal framework including both possible and so-called impossible worlds. The latter secure lack of classical logical closure for the relevant mental states, while the variability of strictness captures how the agent imports information from actuality in the imagined (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   55 citations  
  43.  59
    Internal identity is (partly) dispositional identity.Michael Bruckner - 2022 - Synthese 200 (4):1-23.
    Semantic externalism’ is the view that the thought and speech of internally identical subjects can have different contents, depending on facts about their environments. ‘Semantic internalism’ is the negation of this view. The details of these two views depend on the definition of ‘internal identity’. Katalin Farkas has shown that the traditional definition of internal identity as physical identity is too permissive: it misclassifies certain bodily states as internal. She has proposed defining internal identity as phenomenal identity instead. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44. The Metasemantics of Contextual Sensitivity.Jeffrey C. King - 2014 - In Alexis Burgess & Brett Sherman, Metasemantics: New Essays on the Foundations of Meaning. New York: Oxford University Press. pp. 97-118.
    Some contextually sensitive expressions are such that their context independent conventional meanings need to be in some way supplemented in context for the expressions to secure semantic values in those contexts. As we’ll see, it is not clear that there is a paradigm here, but ‘he’ used demonstratively is a clear example of such an expression. Call expressions of this sort supplementives in order to highlight the fact that their context independent meanings need to be supplemented in context for (...)
    Direct download  
     
    Export citation  
     
    Bookmark   59 citations  
  45. Reconceptualizing American Democracy: The First Principles.Angelina Inesia-Forde - 2023 - Asian Journal of Basic Science and Research 5 (4):01-47.
    An outstanding group of leaders left evidence that a richer and more sustainable democracy could be achieved with American independence and democratic principles integrated into a new republican form of government. They were moved by principles that are the very spirit of democracy. These principles are needed to enhance democracy and improve well-being. Using the constructivist tradition of grounded theory and Aristotle’s conception of abstraction, the article proposes a theory of the first principles of democracy based on substantive data: the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  46. Foucault and Kripke on the Proper Names of Authors.Christopher Mole - 2016 - Philosophy and Literature 40 (2):383-398.
    The semantic issues that Saul Kripke addressed in Naming and Necessity overlap substantially with those that were addressed by Michel Foucault in “What Is an Author?”. The present essay examines their area of overlap, with a view to showing that each of these works affords a perspective on the other, from which facets that are usually obscure can be brought into view. It shows that Foucault needs to take some assumptions from Kripke’s theory of naming in order to secure (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47. Essential Contestability and Evaluation.Pekka Väyrynen - 2014 - Australasian Journal of Philosophy 92 (3):471-488.
    Evaluative and normative terms and concepts are often said to be "essentially contestable". This notion has been used in political and legal theory and applied ethics to analyse disputes concerning the proper usage of terms like democracy, freedom, genocide, rape, coercion, and the rule of law. Many philosophers have also thought that essential contestability tells us something important about the evaluative in particular. Gallie (who coined the term), for instance, argues that the central structural features of essentially contestable concepts secure (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  48. Metasemantics and Singular Reference.Ori Simchen - 2017 - Noûs 51 (2):175-195.
    I consider two competing approaches to metasemantics: productivism, whereby endowment with semantic significance emerges directly from conditions surrounding the production or employment of the items semantically endowed; and interpretationism, whereby endowment with semantic significance emerges directly from conditions surrounding the interpretive consumption of such items. Focusing on the version of interpretationism developed by Lewis and his followers, I present a novel argument to the conclusion that such an approach cannot secure determinacy for singular reference. I then draw a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  49. Relaxing about Moral Truths.Christine Tiefensee - 2019 - Ergo: An Open Access Journal of Philosophy 6:869-890.
    As with all other moral realists, so-called relaxed moral realists believe that there are moral truths. Unlike metaphysical moral realists, they do not take themselves to be defending a substantively metaphysical position when espousing this view, but to be putting forward a moral thesis from within moral discourse. In this paper, I employ minimalism about truth to examine whether or not there is a semantic analysis of the claim ‘There are moral truths’ which can support this moral interpretation of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  50. Pragmatism and inferentialism.John MacFarlane - 2010 - In Bernhard Weiss & Jeremy Wanderer, Reading Brandom: on making it explicit. New York: Routledge. pp. 81--95.
    One of the central themes of Brandom’s work is that we should construct our sematic theories around material validity and incompatibility, rather than reference, truth, and satisfaction. This approach to semantics is motivated in part by Brandom’s pragmatism about the relation between semantics and the more general study of language use—what he calls “pragmatics”: Inferring is a kind of doing. . . . The status of inference as something that can be done accordingly holds out the promise of securing an (...)
    Direct download  
     
    Export citation  
     
    Bookmark   18 citations  
1 — 50 / 973