Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailInput/output logics with a consistency check
Parent, Xavier UL; van der Torre, Leon UL

in Pigozzi, Gabriella; Broersen, Jan; Condoravdi, Cleo (Eds.) et al Deontic Logic and Normative Systems (DEON 2018) (2018)

Norm-based semantics to deontic logic typically come in an unconstrained and constrained version, where the unconstrained version comes with a proof system, and the constraints handle phenomena such as ... [more ▼]

Norm-based semantics to deontic logic typically come in an unconstrained and constrained version, where the unconstrained version comes with a proof system, and the constraints handle phenomena such as dilemmas, contrary-to-duty reasoning, uncertaintyanddefeasibility. Thisisanalogoustotheuseofrule-basedlanguagesin non-monotonic logic such as logic programming or default logic, but in contrast to the traditional modal framework. Traditionally, for example, specific modal deontic logics have been defined that make dilemmas inconsistent, as well as other modal deontic logics representing dilemmas in a consistent way. This issue was raised recently in the input/output logic framework, and weaker unconstrained logics have been defined handling phenomena like dilemmas and contrary-to-duty reasoning. In this paper we introduce a semantics and proof theory for a system with various desirable properties. We show that our new deontic logic satisfies a criterion posed several years ago by Broersen and van der Torre, allowing deontic detachment while preventing Prakken and Sergot’s pragmatic oddities as well as Sergot’s drowning problem. [less ▲]

Detailed reference viewed: 51 (5 UL)
Full Text
See detailEditorial: Germany from a French Perspective
Deshaies, Michel; Depraz, Samuel; Schulz, Christian UL et al

in Europa Regional (2018), 25(3-4), 3-4

Detailed reference viewed: 50 (1 UL)
See detailMalte, une île au centre de controverses contemporaines
Lemaire, Léa UL

Article for general public (2018)

Detailed reference viewed: 50 (3 UL)
Peer Reviewed
See detailStudent mobility and its social dimension in Luxembourg
Kmiotek-Meier, Emilia Alicja UL

Scientific Conference (2018)

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailTriathlon of Lightweight Block Ciphers for the Internet of Things
Dinu, Dumitru-Daniel UL; Le Corre, Yann UL; Khovratovich, Dmitry UL et al

in Journal of Cryptographic Engineering (2018)

In this paper, we introduce a framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms. Our framework is able to evaluate the execution time, RAM footprint, as well ... [more ▼]

In this paper, we introduce a framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms. Our framework is able to evaluate the execution time, RAM footprint, as well as binary code size, and allows one to define a custom "figure of merit" according to which all evaluated candidates can be ranked. We used the framework to benchmark implementations of 19 lightweight ciphers, namely AES, Chaskey, Fantomas, HIGHT, LBlock, LEA, LED, Piccolo, PRESENT, PRIDE, PRINCE, RC5, RECTANGLE, RoadRunneR, Robin, Simon, SPARX, Speck, and TWINE, on three microcontroller platforms: 8-bit AVR, 16-bit MSP430, and 32-bit ARM. Our results bring some new insights into the question of how well these lightweight ciphers are suited to secure the Internet of things. The benchmarking framework provides cipher designers with an easy-to-use tool to compare new algorithms with the state of the art and allows standardization organizations to conduct a fair and consistent evaluation of a large number of candidates. [less ▲]

Detailed reference viewed: 125 (1 UL)
Full Text
Peer Reviewed
See detailTwenty years of Escaping the Java Sandbox
Bartel, Alexandre UL; Doe, John

Article for general public (2018)

The Java platform is broadly deployed on billions of devices, from servers and desktop workstations to consumer electronics. It was originally designed to implement an elaborate security model, the Java ... [more ▼]

The Java platform is broadly deployed on billions of devices, from servers and desktop workstations to consumer electronics. It was originally designed to implement an elaborate security model, the Java sandbox, that allows for the secure execution of code retrieved from potentially untrusted remote machines without putting the host machine at risk. Concretely, this sandboxing approach is used to secure the execution of untrusted Java applications such as Java applets in the web browser. Unfortunately, critical security bugs -- enabling a total bypass of the sandbox -- affected every single major version of the Java platform since its introduction. Despite major efforts to fix and revise the platform's security mechanisms over the course of two decades, critical security vulnerabilities are still being found. In this work, we review the past and present of Java insecurity. Our goal is to provide an overview of how Java platform security fails, such that we can learn from the past mistakes. All security vulnerabilities presented here are already known and fixed in current versions of the Java runtime, we discuss them for educational purposes only. This case study has been made in the hope that we gain insights that help us design better systems in the future. [less ▲]

Detailed reference viewed: 112 (11 UL)
See detailAre Capital Requirements on Small Business Loans Flawed?
Wolff, Christian UL; Bams, Dennis; Magdalena, Pisa

E-print/Working paper (2018)

Detailed reference viewed: 54 (0 UL)
Full Text
Peer Reviewed
See detailHuman Rights – Inclusion – Education. Interdisciplinary and Comparative Perspectives
Schäfer, Lea; Köpfer, Andreas; Aust, Robert et al

in Bildung und Erziehung (2018), 71(4), 481-482

Detailed reference viewed: 99 (1 UL)
Full Text
Peer Reviewed
See detailPrioritized norms in formal argumentation
Liao, Beishui; Oren, Nir; van der Torre, Leon UL et al

in Journal of Logic and Computation (2018)

To resolve conflicts amongst norms, various non-monotonic formalisms can be used to perform prioritized normative reasoning. Meanwhile, formal argumentation provides a way to represent non-monotonic ... [more ▼]

To resolve conflicts amongst norms, various non-monotonic formalisms can be used to perform prioritized normative reasoning. Meanwhile, formal argumentation provides a way to represent non-monotonic logics. In this paper we propose a representation of prioritized normative reasoning by argumentation. Using hierarchical abstract normative systems (HANS), we define three kinds of prioritized normative reasoning approaches called Greedy, Reduction and Optimization. Then, after formulating an argumentation theory for a HANS, we show that for a totally ordered HANS, Greedy and Reduction can be represented in argumentation by applying the weakest link and the last link principles, respectively, and Optimization can be represented by introducing additional defeats capturing the idea that for each argument that contains a norm not belonging to the maximal obeyable set then this argument should be rejected. [less ▲]

Detailed reference viewed: 90 (12 UL)
Full Text
See detailBlockchain distributed ledgers and liability
Zetzsche, Dirk Andreas UL; Buckley, R.; Arner, D.

in Journal of Digital Banking (2018)

Detailed reference viewed: 85 (1 UL)
Full Text
Peer Reviewed
See detailAegean in Motion: The Reasons, Consequences and Tragedies of Four Distinct Phases of Migration in the Aegean Sea
Samuk, Sahizer UL; Papuççular, Hazal

in Journal of Izmir Mediterranean Academy (2018)

This study deals with the concept of Aegean in Motion and conflict of this concept with migration policy making in Turkey. We argue that the region has always been a route for immigration and emigration ... [more ▼]

This study deals with the concept of Aegean in Motion and conflict of this concept with migration policy making in Turkey. We argue that the region has always been a route for immigration and emigration with distinct causes and consequences. Our aim is to focus on four different and massive phases of this motion. First, it looks at the period that started in the nineteenth century and ended with the Turkish-Greek population exchange. This wave was closely associated with war, state building, and the aims of ethnic homogenization within newly formed borders. Second phase of this migration starts with the rising fascist policies of Italy in the Dodecanese in the second half of the 1930s and reaches the peak point in the Second World War. This period, again related to political crisis and war, indicates fragmented policies by the host state, which was Turkey, towards different nationalities: Turks, Greeks, and Axis soldiers. The third phase of movement was in the post-1980 period when Turkey became an immigration and so-called “a transit country”. It was discovered later that the migrant and refugee journeys were fragmented and refugees were stranded in the region. The post-2000 period faced many dilemmas: major numbers of crossings from Turkey to Greek shores, deaths in thousands in one year and the readmission deal between EU and Turkey and strengthening border controls via Frontex and EU externalization of migration policy. These four phases are examined via archival work and desk-based research/literature review of articles with a historical perspective, and for each phase a model of immigration policy and state response/facilitation to these mobilities will be elaborated. [less ▲]

Detailed reference viewed: 63 (1 UL)
Full Text
Peer Reviewed
See detailMigration in der deutschen Literatur des Mittelalters
Sieburg, Heinz UL

in Radulescu, Raluca; Perrone Capano, Lucia; Gagliardi, Nicoletta (Eds.) et al Interkulturelle Blicke auf Migrationsbewegungen in alten und neuen Texten (2018)

Detailed reference viewed: 78 (0 UL)
See detailStereotype und Vorurteile (Lernmodul für den Friedrich Verlag)
Pavlik, Jennifer UL

Learning material (2018)

Detailed reference viewed: 54 (0 UL)
Full Text
Peer Reviewed
See detailMultilingual Philology and Monolingual Faust: Theoretical Perspectives and a Reading of Goethe's Drama
Dembeck, Till UL

in German Studies Review (2018), 41(3), 567-588

Detailed reference viewed: 77 (4 UL)
Full Text
See detailÉducation non formelle à l’âge préscolaire
Neumann, Sascha UL

in SCRIPT; LUCET (Eds.) Rapport national sur l’éducation au Luxembourg 2018 (2018)

Detailed reference viewed: 38 (6 UL)
See detailSchnëssen-App - Är Sprooch fir d'Fuerschung
Entringer, Nathalie UL; Gilles, Peter UL; Martin, Sara UL et al

Software (2018)

Detailed reference viewed: 135 (30 UL)